Configure Keycloak for OIDC
Review OpenID Connect (SaaS).
Configure OpenID Provider for Keycloak
The notes below describe minimal steps to be taken in Keycloak. You may need to adjust the steps based on the specifics of your environment.
Log in to your Keycloak server’s Administrative Console.
Select a realm or create a new one.
Click Clients > Create.
Enter the Client ID of your choosing (e.g. “SysdigMonitor”) and take note of it.
You will need it for the OpenID Configuration tab in the Sysdig Authentication(SSO) Settings.
Make sure the Client Protocol drop-down has
openid-connectselected. Click Save.
Configure the OpenID Connect client:
Toggle the Authorization Enabled setting to ON.
For Valid Redirect URI, enter one of the following values:
See SaaS Regions and IP Ranges and identify the correct domain URL (Redirect URI) associated with your Sysdig application and region. For example, domain URLs of Monitor and Secure for US East are:
For other regions, the format is
<region>with the region where your Sysidig application is hosted. For example, for Sysdig Monitor you use https://eu1.app.sysdig.com/api/oauth/openid/auth.
Click Save .
Open the Credentials tab. Take note of the Secret that is shown.
You will need it in the OpenID settings.
Note that the
Issuer URLwill consist of
REALM_NAMEare derived from your environment where you just created the configuration. You will enter it in the OpenID settings.
Configure Sysdig Settings
To enable Keycloak OpenID functionality on the Sysdig application, you need the following:
See Enable OpenID in Settings to learn how to complete your configuration.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.