Keycloak with openZro Self-Hosted

Keycloak is an open-source Identity and Access Management solution maintained by Red Hat. It provides single sign-on, social login, user federation, fine-grained authorization, and supports OpenID Connect, OAuth 2.0, and SAML 2.0 protocols.

Add Keycloak as an external IdP directly in the openZro Management Dashboard. This is the simplest approach and recommended for most deployments.

Prerequisites

  • openZro self-hosted with embedded IdP enabled
  • Keycloak instance running with SSL

Step 1: Create Realm in Keycloak

  1. Open the Keycloak Admin Console
  2. Hover over the realm dropdown in the top-left corner (where it shows Master or your current realm)
  3. Click Create Realm

Create realm

  1. Fill in:
    • Realm name: openzro

Realm name

  1. Click Create
  2. Verify that openzro is now selected in the realm dropdown

Step 2: Create User in Keycloak

  1. Make sure the openzro realm is selected
  2. Click Users (left-hand menu)
  3. Click Create new user

Create new user

  1. Fill in:
    • Username: openzro (or your preferred username)
    • Email: Your email address
  2. Click Create
  3. Click the Credentials tab
  4. Click Set password
  5. Fill in the password and set Temporary to Off
  6. Click Save

User password

Step 3: Start Creating Client in Keycloak

  1. Click ClientsCreate client

Create client

  1. Fill in the form:
    • Client type: OpenID Connect
    • Client ID: openzro

OpenID client ID

  1. Click Next
  2. On Capability config:
    • Enable Client authentication

Client authentication enabled

  1. Click Next
  2. On Login settings page, don't click Save yet — you'll add the redirect URI in Step 4

Step 4: Get Redirect URL from openZro

  1. Open a new tab or window and log in to your openZro Dashboard
  2. Navigate to SettingsIdentity Providers
  3. Click Add Identity Provider
  4. Select Keycloak (or choose Generic OIDC if Keycloak is not listed)
  5. Fill in the fields (you can leave Client Secret empty for now):
FieldValue
TypeGeneric OIDC (if not already selected)
NameKeycloak (or your preferred display name)
Client IDopenzro (from Step 3)
Client SecretLeave empty for now
Issuerhttps://keycloak.example.com/realms/openzro
  1. openZro will display a Redirect URLcopy this URL (but don't click Add Provider yet)

Copy redirect URL from openZro

Step 5: Complete Client Configuration in Keycloak

  1. Return to the Keycloak Admin Console tab
  2. On the Login settings page:
    • Under Valid redirect URIs, paste the redirect URL you copied from openZro
  3. Click Save
  4. Go to the Credentials tab and copy the Client secret — you'll need this for Step 6

Copy client secret

Step 6: Complete openZro Setup

  1. Return to the openZro tab
  2. In the identity provider form, paste the Client secret you copied from Step 5
  3. Click Add Provider

openZro Keycloak configuration

Step 7: Test the Connection

  1. Log out of openZro Dashboard
  2. On the login page, you should see a "Keycloak" button
  3. Click it and authenticate with the user credentials you created in Step 2
  4. You should be redirected back to openZro and logged in

openZro Keycloak login

Configuring JWT 'groups' Claim

To sync Keycloak groups with openZro, you need to create a client scope with a group membership mapper.

Step 1: Create Groups Client Scope

  1. In Keycloak Admin Console, ensure the openzro realm is selected
  2. Go to Client scopesCreate client scope
  3. Fill in:
    • Name: groups
    • Type: Default
    • Include in token scope: On
  4. Click Save

Create client scope

Step 2: Add Group Membership Mapper

  1. In the newly created groups client scope, go to the Mappers tab
  2. Click Configure a new mapper
  3. Select Group Membership
  4. Configure the mapper:
    • Name: groups
    • Token Claim Name: groups
    • Full group path: Off (recommended for cleaner group names)
    • Add to ID token: On
    • Add to access token: On
    • Add to userinfo: On
    • Add to token introspection: Off
  5. Click Save

Add group mapper

Step 3: Add Client Scope to openZro Client

  1. Go to Clientsopenzro (your client)
  2. Go to the Client scopes tab
  3. Click Add client scope
  4. Select groups and add it as Default

Add client scope

Step 4: Create Groups and Assign Users

  1. Go to GroupsCreate group
  2. Create groups as needed (e.g., admins, developers)
  3. Go to Users → select a user → Groups tab
  4. Click Join Group and assign users to groups

Step 5: Enable JWT Group Sync in openZro

  1. In openZro Dashboard, go to SettingsGroups
  2. Enable JWT group sync
  3. Set JWT claim to groups
  4. Optionally configure JWT allow groups to restrict access

Standalone Setup (Advanced)

Use Keycloak as your primary identity provider instead of openZro's embedded IdP. This option gives you full control over authentication and user management, is recommended for experienced Keycloak administrators as it also requires additional setup and ongoing maintenance.

For most deployments, the embedded IdP is the simpler choice — it's built into openZro, fully integrated, and requires minimal configuration to get started. For this implementation, go back up to the Management Setup (Recommended) section above.

For detailed instructions on the standalone setup, see the Keycloak SSO with openZro Self-Hosted (Advanced) documentation.


Troubleshooting

"Invalid redirect URI" error

  • Ensure the redirect URI matches exactly what's configured
  • Use the exact URL from the openZro success modal

"Invalid token" errors

  • Verify the issuer URL includes /realms/openzro (or your realm name)
  • Ensure the client ID matches in both Keycloak and openZro
  • Check clock synchronization between servers

Users not appearing in openZro

  • Users appear after their first successful login