This guide details the steps required to configure Keycloak and integrate it with Pritunl Enterprise, including optional configuration for the pritunl-keycloak-user-check.
- Configure Keycloak
- Configure Pritunl Enterprise to Use Keycloak
- Optional: Configure pritunl-keycloak-user-check
Set up a new client in Keycloak with the following example configuration:
- Client Type: SAML
- Client ID: pritunl
- Name: Pritunl SSO Client
- Valid Redirect URIs: https://auth.pritunl.com/v1/callback/saml
- Name ID Format: email
- Force Name ID Format: On
- Force POST Binding: On
- Include AuthnStatement: Off
- Sign Documents: On
- Front Channel Logout: On
Keys Configuration:
- Client Signature Required: Off
Client Scopes: Navigate to the "pritunl-dedicated" scope and select Configure a new mapper. Choose User Property.
- Set Name: email
- Choose Property: email
- Set Friendly Name: Email
- Set SAML Attribute Name: email
- Set SAML Attribute NameFormat: Basic
- Click Save.
To configure Pritunl Enterprise, gather the following information from Keycloak:
Obtain from https://<keycloak_url>/realms/<your_realm>/protocol/saml/descriptor or from Realm Settings -> Keys -> RS256 Certificate button. Ensure to wrap the certificate with -----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----.
Example: https://<keycloak_url>/realms/<your_realm>/protocol/saml
Example: https://<keycloak_url>/realms/<your_realm>
Select your organization, only one can be chosen.
Set to SAML in Pritunl settings.
Use documentation from README.md in this repository.