Skip to main content
Version: v2.11 (Preview)

Configure Keycloak (OIDC)

If your organization uses Keycloak Identity Provider (IdP) for user authentication, you can configure Rancher to allow your users to log in using their IdP credentials. Rancher supports integration with Keycloak using the OpenID Connect (OIDC) protocol and the SAML protocol. Both implementations are functionally equivalent when used with Rancher. This page describes the process to configure Rancher to work with Keycloak using the OIDC protocol.

If you prefer to use Keycloak with the SAML protocol instead, refer to this page.

If you have an existing configuration using the SAML protocol and want to switch to the OIDC protocol, refer to this section.

Prerequisites

  • On Rancher, Keycloak (SAML) is disabled.

  • You must have a Keycloak IdP Server configured.

  • Follow the Keycloak documentation to create a new OIDC client with the settings below.

    SettingValue
    Client ID<client-id> (e.g. rancher)
    Name<client-name> (e.g. rancher)
    Client typeOpenID Connect
    Client authenticationON
    Valid Redirect URIhttps://yourRancherHostURL/verify-auth
  • In the new OIDC client, create Mappers to expose the users fields.

    1. In the navigation menu, click Clients.

    2. Click the Clients list tab.

    3. Find and click the client you created.

    4. Click the Client scopes tab.

    5. Find and click the link labeled <client-name>-dedicated. For example, if you named your client rancher, look for the link named rancher-dedicated.

    6. Click the Mappers tab.

    7. Click Configure a new mapper. If you already have existing mappers configured, click the arrow next to Add mapper and select By configuration. Repeat this process and create these mappers:

      • From the mappings table, select Group Membership and configure a new "Groups Mapper" with the settings below. For settings that are not mentioned, use the default value.

        SettingValue
        NameGroups Mapper
        Mapper TypeGroup Membership
        Token Claim Namegroups
        Full group pathOFF
        Add to ID tokenOFF
        Add to access tokenOFF
        Add to user infoON
      • From the mappings table, select Audience and configure a new "Client Audience" with the settings below. For settings that are not mentioned, use the default value.

        SettingValue
        NameClient Audience
        Mapper TypeAudience
        Included Client Audience<client-name>
        Add to ID tokenOFF
        Add to access tokenON
      • From the mappings table, select Group Membership and configure a new "Groups Path" with the settings below. For settings that are not mentioned, use the default value.

        SettingValue
        NameGroup Path
        Mapper TypeGroup Membership
        Token Claim Namefull_group_path
        Full group pathON
        Add to ID tokenON
        Add to access tokenON
        Add to user infoON
  • Add the following role mappings to all users or groups that need to query the Keycloak users.

  1. In the navigation menu, click Users.
  2. Click the user you want to add role mappings to.
  3. Click the Role mapping tab.
  4. Click Assign role.
  5. Select the following roles:
    • query-users
    • query-groups
    • view-users
  6. Click Assign.

Configuring Keycloak in Rancher

  1. In the Rancher UI, click ☰ > Users & Authentication.

  2. In the left navigation bar, click Auth Provider.

  3. Select Keycloak (OIDC).

  4. Complete the Configure a Keycloak OIDC account form. For help with filling the form, see the configuration reference.

    note

    When configuring the Endpoints section using the Generate option, Rancher includes /auth as part of the context path in the Issuer and Auth Endpoint fields, which is only valid for Keycloak 16 or older. You must configure endpoints using the Specify option for Keycloak 17 and newer, which have migrated to Quarkus.

  5. After you complete the Configure a Keycloak OIDC account form, click Enable.

    Rancher redirects you to the IdP login page. Enter credentials that authenticate with Keycloak IdP to validate your Rancher Keycloak configuration.

    note

    You may need to disable your popup blocker to see the IdP login page.

Result: Rancher is configured to work with Keycloak using the OIDC protocol. Your users can now sign in to Rancher using their Keycloak logins.

Configuration Reference

FieldDescription
Client IDThe Client ID of your Keycloak client.
Client SecretThe generated Secret of your Keycloak client. In the Keycloak console, select Clients, select the client you created, select the Credentials tab and copy the value of the Secret field.
Private Key / CertificateA key/certificate pair to create a secure shell between Rancher and your IdP. Required if HTTPS/SSL is enabled on your Keycloak server.
EndpointsChoose whether to use the generated values for the Rancher URL, Issue, and Auth Endpoint fields or to provide manual overrides if incorrect.
Keycloak URLThe URL for your Keycloak server.
Keycloak RealmThe name of the realm in which the Keycloak client was created in.
Rancher URLThe URL for your Rancher Server.
IssuerThe URL of your IdP.
Auth EndpointThe URL where users are redirected to authenticate.

Migrating from SAML to OIDC

This section describes the process to transition from using Rancher with Keycloak (SAML) to Keycloak (OIDC).

  1. Reconfigure Keycloak.
    1. Configure a new OpenID Connect client according to the Prerequisites. Ensure the same Valid Redirect URIs are set.
    2. Configure mappers for the new client according to the Prerequisites.
  2. Before configuring Rancher to use Keycloak (OIDC), Keycloak (SAML) must be first disabled.
    1. In the Rancher UI, click ☰ > Users & Authentication.
    2. In the left navigation bar, click Auth Provider.
    3. Select Keycloak (SAML).
    4. Click Disable.
  3. Follow the steps in Configuring Keycloak in Rancher.
caution

After configuration is completed, Rancher user permissions need to be reapplied as they are not automatically migrated.

Annex: Troubleshooting

If you are experiencing issues while testing the connection to the Keycloak server, first double-check the configuration options of your OIDC client. You may also inspect the Rancher logs to help pinpoint what's causing issues. Debug logs may contain more detailed information about the error. Please refer to How can I enable debug logging in this documentation.

All Keycloak related log entries are prepended with either [generic oidc] or [keycloak oidc].

You are not redirected to Keycloak

When you fill the Configure a Keycloak OIDC account form and click Enable, you are not redirected to your IdP.

Verify your Keycloak client configuration.

The generated Issuer and Auth Endpoint are incorrect

On the Configure a Keycloak OIDC account form, change Endpoints to Specify (advanced) and override the Issuer and Auth Endpoint values. To find the values, go to the Keycloak console and select Realm Settings, select the General tab, and click OpenID Endpoint Configuration. The JSON output displays values for issuer and authorization_endpoint.

Keycloak Error: "Invalid grant_type"

In some cases, this error message may be misleading and is caused by setting the Valid Redirect URI incorrectly.

Unable to See Groups When Assigning Global Roles

If you use a user that is not part of any groups for initial setup, then you cannot search for groups when trying to assign a global role. To resolve this, you can either:

  1. Manually edit the authconfig/keycloakoidc object to enable group search.

    1. On the Rancher server:
      kubectl edit authconfigs.management.cattle.io keycloakoidc
    2. Set groupSearchEnabled: true.
    3. Save your changes.
  2. Reconfigure your Keycloak OIDC setup using a user that is assigned to at least one group in Keycloak.