Configurations

  • Once the extension is installed successfully, navigate to the OpenID Connect Client tab of the plugin and fill in all the required fields as below:
    • OAuth/ OpenID Provider Name: {Name of your provider (e.g., Keycloak)}

    • Application type: OAuth/OpenID Connect

    • Frontend Redirect/Callback Url : {Response Plugin Page URL which you created in step 4} (You will need to provide this URL to your OAuth/OIDC provider i.e., Keycloak)

    • feoidc page URL: {feoidc Plugin Page URL which you created in step 4}

    • Client ID : {You will get it from your provider, i.e., keycloak}

    • Client Secret : {You will get it from your provider, i.e., keycloak}

    • Scope : openid profile email

    • Authorization Endpoint : <Keycloak base URL>/realms/{realm-name}/protocol/openid-connect/auth

    • Token Endpoint : <Keycloak base URL>/realms/{realm-name}/protocol/openid-connect/token

    • User Info Endpoint : <Keycloak base URL>/realms/{realm-name}/protocol/openid-connect

    • Set client credentials in : Header/Body

OpenID Connect Client Configurations
  • Provide the redirect/callback URL in your Keyclaok application by copying it from Frontend Redirect/Callback Url field in OpenID Connect Client tab.

Keycloak Callback/Redirect URL
  • Once you are done with the configurations on both ends (i.e., Typo3 and Keycloak), click on the Test Configuration button in the OpenID Connect Client tab of the plugin and check if you are able to test it successfully.

Test Configuration Window
  • Navigate to the Attribute Mapping tab and map the Username attribute to the keycloak attribute using which you want to identify the users in Typo3 (you can find all the attributes received from keycloak in the test configuration).

Attribute Mapping Settings
  • Navigate to the Group Mapping tab of the plugin and save the Group Mapping for Frontend Users by selecting the Default Usergroup.

Role Mapping Settings
  • Once you have done all the above steps, you are ready to test the SSO. You can use your Feoidc Page URL in order to initiate the SSO.

You can refer to the below guide link for more information: https://plugins.miniorange.com/keycloak-single-sign-on-typo3-sso-oauth-openid-connect