Keycloak Integration
This guide explains how to integrate Keycloak with Oobeya to enable Single Sign-On (SSO) authentication for your users.
Overview
By integrating Keycloak as an identity provider, Oobeya can authenticate users via your existing IAM setup, improving security, user experience, and centralized access management.
Prerequisites
Before you begin, make sure you have:
Access to a Keycloak instance with admin privileges
Access to Oobeya Admin Panel
Your Keycloak Base URL
Your Oobeya Base URL
Part 1: Configure Keycloak
Step 1: Create a New Client
Log in to the Keycloak Admin Console
Select your Realm (or create a new one)
Navigate to Clients from the left menu
Click Create
Step 2: General Settings
Configure the client with the following values:
Client ID
oobeya-client
Name
Oobeya (optional)
Description
Integration with Oobeya platform (optional)
Always display in UI
On
Step 3: Access Settings
Valid Post Logout Redirect URIs
Optional
Leave empty or define explicitly
Web Origins
{{YOUR_OOBEYA_BASE_URL}}
Add dev URLs if required
Step 4: Capability Configuration
Set authentication flows as follows:
Client Authentication: On
Authorization: Off
Authentication Flow:
✅ Standard Flow
⛔ All others disabled
⚠️ Important: Only Standard Flow should be enabled for Oobeya.
Step 5: Client Credentials
Open the Credentials tab
Copy the Client Secret
Store it securely — it will be required in Oobeya
Part 2: Configure Oobeya
Step 1: Open Keycloak Settings
Log in to Oobeya as an Administrator
Navigate to Settings > Keycloak Authentication
Step 2: Enable Keycloak Authentication
Enable the toggle:
Configure Keycloak settings to authenticate users
Step 3: Connection Settings
Fill in the required fields:
Callback URL
Oobeya callback endpoint
{{YOUR_OOBEYA_BASE_URL}}/callback
Realm
Keycloak realm name
oobeya
Client ID
Must match Keycloak
oobeya-client
Client Secret
From Keycloak
********
Step 4: User Management Options
Do not allow login if user does not exist in Oobeya
Default: Enabled
Requires users to be pre-created in Oobeya
Create a profile for every user logging in via Keycloak
Default: Enabled
Automatically creates user profiles on first login
Recommended Configurations
Controlled access: Enable both options
Automatic provisioning: Disable user existence check, enable profile creation
Step 5: Save Configuration
Review all settings
Click Save to apply
Use Reset to discard changes
Part 3: Test the Integration
Authentication Test
Log out of Oobeya
Open the Oobeya login page
Click Login with Keycloak
Authenticate via Keycloak
Verify successful redirect to Oobeya
Verify User Creation
Log in as an Oobeya admin
Open Users section
Confirm Keycloak users are listed (if auto-provisioning is enabled)
Troubleshooting
Ensure redirect URLs match exactly
Verify realm and client ID consistency
Check Keycloak logs for authentication errors
Validate client secret correctness
If you need help, contact Oobeya Support or your solution partner.
Last updated
Was this helpful?