Jenkins SAML SSO app gives the ability to enable SAML Single Sign-On (SSO) for Jenkins. Here we will go through a guide to configure Single Sign On (SSO) between Jenkins and Jboss Keycloak. By the end of this guide, Jboss Keycloak users should be able to log in and register to Jenkins.
To integrate your Identity Provider (IDP) with Jenkins, you need the following items:
Client ID | The SP-EntityID / Issuer from the plugin's Service Provider Metadata tab |
Name | Provide a name for this client |
Description | Provide a description |
Client Signature Required | OFF |
Force POST Binding | OFF |
Force Name ID Format | OFF |
Name ID Format | |
Root URL | Leave empty or Provide Base URL from Service Provider Metadata tab |
Valid Redirect URIs | The ACS (Assertion Consumer Service) URL from the plugin's Service Provider Metadata tab |
Assertion Consumer Service POST Binding URL | The ACS (Assertion Consumer Service) URL from the plugin's Service Provider Metadata tab |
Logout Service Redirect Binding URL (Optional) | The Single Logout URL from the plugin's Service Provider Metadata tab |
Client ID | The SP-EntityID / Issuer from the plugin's Service Provider Metadata tab |
Name | Provide a name for this client |
Description | Provide a description |
Client Signature Required | OFF |
Force POST Binding | OFF |
Force Name ID Format | OFF |
Name ID Format | |
Root URL | Leave empty or Provide Base URL from Service Provider Metadata tab |
Valid Redirect URIs | The ACS (Assertion Consumer Service) URL from the plugin's Service Provider Metadata tab |
Assertion Consumer Service POST Binding URL | The ACS (Assertion Consumer Service) URL from the plugin's Service Provider Metadata tab |
Logout Service Redirect Binding URL (Optional) | The Single Logout URL from the plugin's Service Provider Metadata tab |
Root URL | Leave empty or provide Base URL from Service Provider Metadata tab |
Valid Redirect URIs | The ACS (Assertion Consumer Service) URL from the plugin's Service Provider Metadata tab |
Force POST Binding | OFF |
Force Name ID Format | OFF |
Name ID Format |
Assertion Consumer Service POST Binding URL | The ACS (Assertion Consumer Service) URL from the plugin's Service Provider Metadata tab |
Logout Service Redirect Binding URL (Optional) | The Single Logout URL from the plugin's Service Provider Metadata tab |
Add Mappers
Download setup file
You have successfully configured Keycloak as SAML IdP ( Identity Provider) for achieving Kecloak SSO, ensuring secure Login into (WP) Site.
You have successfully configured Keycloak as SAML IdP ( Identity Provider) for achieving Keycloak login / Keycloak SSO / Keycloak Single Sign-On (SSO), ensuring secure Login into (WP) Site.
If you don't find what you are looking for, please contact us at support-atlassian@miniorange.atlassian.net or raise a support ticket here.