I have followed the guide https://ultimatesecurity.pro/post/okta-saml/ , to configure OKTA Saml with keycloak. After this configuration, I see Okta/saml login button on login page, clicking on which, the user is redirected to Okta login/SSO.
Now, is there a way to avoid clicking on this button everytime such that when the keycloak login page appears, user is auto redirected to Okta SSO automatically instead of shown keycloak login form with okta redirect button?
If not, is it possible to enter okta username password within the keycloak form fields and keycloak have it validated internally from Okta?
This requirement is because the customer is using only Okta as IDP and does not have any other like LDAP etc and clicking on a button seems overhead.
Sign in a user Test your integration by starting your server and signing in a user. Open a browser and navigate to http://localhost:8080 . You are redirected to Okta to sign in. When you return, it should display your user information.
Keycloak and Okta need to be configured in parallel. First, you need to add an OpenID Connect Identity Provider in Keycloak. Then you to add an OpenID Connect application in Okta using the Keycloak Redirect URI value.
Keycloak is an IDP. Keycloak can be configured to delegate authentication to one or more IDPs. Social login via Facebook or Google+ is an example of identity provider federation. You can also hook Keycloak to delegate authentication to any other OpenID Connect or SAML 2.0 IDP.
The solution is pretty simple.
1. Go to Realm -> Configure -> Authentication
2. Go to Flows -> Browser-> Identity Provider Redirecter -> Actions -> Config
3. Enter the saml / okta identity provider name that you have created for your realm
(as you can see in my case it was saml-okta-41)
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With