privacyIDEA provider for Keycloak
This provider allows you to use privacyIDEA's 2FA with Keycloak.
We added a detailed how to in our blog.
In the blog entry, you can find an example with Keycloak, privacyIDEA and Drupal.
- Check our latest releases.
- Download the assets privacyIDEA.jar and optionally privacyIDEA.ftl.
- Move the packed jar file into your deployment directory
- Move the template privacyIDEA.ftl to
themes/base/login. NOTE: For releases from version 0.6 onward, the template will be deployed automatically, so this step can be skipped.
Now you can enable the execution for your auth flow.
If you set the execution as 'required', every user needs to login with a second factor.
You can find different parameters on the configuration page. Those are explained in the following:
|URL||The URL of your privacyIDEA server, which must be reachable from the keycloak server|
|Realm||This realm will be appended to all requests to privacyIDEA. Leave empty to use the privacyIDEA default realm|
|Verify SSL||You can choose if Keycloak should verify the ssl certificate from privacyIDEA. Please do not uncheck this in a productive environment!|
|Preferred Login Token Type||Select the token type for which the UI should be first shown. This only matters if such token was triggered before. The UI defaults to OTP mode.|
|Enable send password||Enable if the password that was used to authenticate with keycloak in the first step should be sent to privacyIDEA to trigger challenges. Mutually exclusive to trigger challenge|
|Enable trigger challenge||Enable if challenges should be triggered beforehand using the provided service account. This is mutually exclusive to sending the password and takes precedence.|
|Service account||The username of the service account to trigger challenges or enroll tokens. Please make sure, that the service account has the correct rights.|
|Service account password||The password of your service account|
|Service account realm||Specify a separate realm for the service account if needed. If the service account is in the same realm as the users, it is sufficient to specify the realm in the config parameter above.|
|Exclude groups||Keycloak groups that should be excluded from 2FA. Multiple groups can be specified, separated with ','.|
|Enable token enrollment||If the current user does not have a token yet, it can be enrolled. The service account has to be set up.|
|Token type||Select the token type for the token enrollment|
|Refresh interval for push tokens||Choose your custom interval in seconds to check if the push token is confirmed. This can be a comma separated list, if you want to change the interval|
|Enable logging||Enable this to have the privacyIDEA Keycloak provider write log messages to the keycloak log file.|
Manual build with source code
First, the SDK submodule has to be build using maven:
mvn clean installin
If the wildfly server is running and remote deployment is configured in the
pom.xml, the authenticator can directly be deployed with
mvn clean install wildfly:deploy.
Otherwise build with
mvn clean installand go on with Installation