Skip to content

Configuring KeyCloak as an OIDC provider for Connections

Configuring Keycloak as the OIDC provider for Connections involves these steps.

  • Creating a realm
  • Within that realm create a client for the Connections web application

    • Configure the callback urls for the client
  • Configure hardcoded realmName claim through the client scope mapper property

  • Configure Keycloak connection to LDAP
  • [Optional] Create additional clients for Oauth applications mobile and desktop plugins

The realm contains the Keycloak OIDC clients which provide the authentication for Connections entities. The main OIDC client is the client for the Connections web application.


  1. To create the Connections Realm in Keycloak, in the Keycloak admin portal Select realm > Add realm. This documentation references the realm name created here as {realm} .
  2. Once created set the realm token properties as appropriate for your deployment via {realm} > Realm Settings > Tokens

    Note: To avoid token time-out issues set the properties Access Token Lifespan and Access Token Lifespan For Implicit Flow to 1 minute less than the WebSphere LTPA timeout.

    For example, if the WebSphere LTPA timeout is set to 720 minutes (12 hours)

    1. set the property Access Token Lifespan to 719 minutes
    2. set the property Access Token Lifespan For Implicit Flow to 719 minutes.

  3. Create the Main Keycloak Client for Connections. Click on Keycloak admin portal and select {realm} > Clients.

  4. Click Create. keycloak_config_oidc_prov_p1.jpg

    Note: {client_id} will also be used later in the Updating WebSphere to support Keycloak OIDC Authentication for Connections section

  5. As part of the client, define the valid callback urls. keycloak_config_oidc_prov_p2.jpg

    Note: oidcclient/keycloak corresponds to property values from the WebSphere TAI referenced later. Specifically, oidcclient is the value of the property provider_x.callbackServletContext and keycloak is the value of the property provider_x.identifier.

  6. Next create a Client Scope Mapper for realmName in the Keycloak admin portal. Go to {realm} > Client Scopes > roles > Mappers > Create.

  7. Click Create.

  8. Fill in the following fields with the values below and click Save.

    1. Name = realmName
    2. Mapper Type = Hardcoded claim
    3. Token claim name = realmName
    4. Claim value = {realm}

    Note: This creates a mapper that provides the realmName as part of the ID and access tokens in the authentication flow. Doing this via the realm's client scope makes it available to all client authentication flows in that same realm including web (defined above), mobile, desktop and 3rd party clients.


  9. Configuring KeyCloak to connect to the enterprise’s LDAP enables Keycloak to provide authentication for the enterprise's users. Informing Keycloak about the users is simple. To do this, go to {realm} > User Federation > Add Provider in the Keycloak admin portal .

  10. Choose ldap and complete the form like the following example. keycloak_config_oidc_prov_p4.jpg
  11. [Optional] Create additional clients for the Connections mobile and desktop plugins applications. Similar to creating the main Connections client, in the Keycloak admin portal go to Clients > Create. Repeat for each client.

    See the information and screenshots below for guidance.

    Mobile Client
    The following creates the Keycloak client for mobile, there is additional Connections configuration required to complete enabling mobile access (see later section).

    Set the values for the following fields as indicated:

    1. Client ID = connections_social_mobile
    2. Enabled = On
    3. Client Protocol = openid-connect
    4. Access Type = public
    5. Standard Flow Enabled = On
    6. Implicit Flow Enabled = Off
    7. Direct Access Grants Enabled = Off
    8. Valid Redirect URIs =

    Under Advanced Settings, set:

    1. Access Token Lifespan = 60
    2. Proof Key for Code Exchange Code Challenge Method = S256
    Desktop Plugins

    Both Mac and Windows Desktop plugins use the same Keycloak client as the Mobile that is defined above (connections_social_mobile). Add the following redirect URI to the Valid Redirect URIs list of the Mobile client Valid Redirect URIs:

    Note: If you are supporting older desktop plugins (pre-21.07):

    • Add another Keycloak client with ClientID: conn-dsk-plugin
    • Other than ClientID, use the same settings as the mobile Keycloak client
    • Add this redirect URI to the Valid Redirect URIs list of the conn-dsk-plugin client:

      Valid Redirect URIs: ''

  12. Outlook Add-in:

    If you are enabling the Connections Outlook Add-in for your users, you will need to make updates to Keycloak to enable login from the add-in. Update the Mobile client (connections_social_mobile) with redirect URIs

    • Add the Outlook Add-in redirect URL to the ‘Valid Redirect URIs’ field. The format should be https://(addin URI)/auth/callback For Example:
    • Update the ‘Web Origins’ field to allow CORS origins from the redirect URIs. Either explicitly specify each redirect URI or specify ‘+’ to allow all the redirect URIs from the ‘Valid Redirect URIs’ field.
    • Update {realm} settings to make sure X-Frame-Options includes “frame-ancestors 'self’”. This allows the Outlook Add-in to be loaded into the iFrame.

Parent topic: Enabling Keycloak as an OIDC provider for Connections