@@ -9,49 +9,49 @@ Libredesk supports external OpenID Connect providers (e.g., Google, Keycloak) fo
9
9
10
10
Since each provider’s configuration might differ, consult your provider’s documentation for any additional or divergent settings.
11
11
12
- 1 . ** Provider Setup: **
12
+ 1 . Provider setup:
13
13
In your provider’s admin console, create a new OpenID Connect application/client. Retrieve:
14
- - ** Client ID**
15
- - ** Client Secret**
16
-
17
- 2 . ** Libredesk Configuration: **
18
- In Libredesk, navigate to ** Security > SSO** and click ** New SSO** . Enter :
19
- - ** Provider URL** (e.g., the URL of your OpenID provider)
20
- - ** Client ID**
21
- - ** Client Secret**
22
- - A descriptive ** Name ** for the connection
23
-
24
- 3 . ** Redirect URL:**
25
- After saving, copy the generated ** Callback URL** from Libredesk and add it as a valid redirect URI in your provider’s client settings.
14
+ - Client ID
15
+ - Client Secret
16
+
17
+ 2 . Libredesk configuration:
18
+ In Libredesk, navigate to Security > SSO and click New SSO and enter the following details :
19
+ - Provider URL (e.g., the URL of your OpenID provider)
20
+ - Client ID
21
+ - Client Secret
22
+ - A descriptive name for the connection
23
+
24
+ 3 . Redirect URL:
25
+ After saving, copy the generated Callback URL from Libredesk and add it as a valid redirect URI in your provider’s client settings.
26
26
27
27
## Provider Examples
28
28
29
- ### Keycloak
29
+ #### Keycloak
30
30
31
31
1 . Log in to your Keycloak Admin Console.
32
32
33
- 2 . In Keycloak, navigate to ** Clients** and click ** Create** :
33
+ 2 . In Keycloak, navigate to Clients and click Create:
34
34
35
- - ** Client ID** (e.g., ` libredesk-app ` )
36
- - ** Client Protocol** : ` openid-connect `
37
- - ** Root URL** and ** Web Origins** : your app domain (e.g., ` https://ticket.example.com ` )
38
- - Under ** Authentication flow** , uncheck everything except ** Standard flow**
39
- - Click ** Save **
35
+ - Client ID (e.g., ` libredesk-app ` )
36
+ - Client Protocol: ` openid-connect `
37
+ - Root URL and Web Origins: your app domain (e.g., ` https://ticket.example.com ` )
38
+ - Under Authentication flow, uncheck everything except the standard flow
39
+ - Click save
40
40
41
- 3 . Go to the ** Credentials ** tab:
42
- - Ensure ** Client Authenticator ** is set to ` Client Id and Secret `
43
- - Note down the generated ** Client Secret **
41
+ 3 . Go to the credentials tab:
42
+ - Ensure client authenticator is set to ` Client Id and Secret `
43
+ - Note down the generated client secret
44
44
45
- 4 . In Libredesk, go to ** Security > SSO** and click ** New SSO** :
46
- - ** Provider URL** (e.g., ` https://keycloak.example.com/realms/yourrealm ` )
47
- - ** Name** (e.g., ` Keycloak ` )
48
- - ** Client ID**
49
- - ** Client Secret **
50
- - Click ** Save **
45
+ 4 . In Libredesk, go to Admin > Security > SSO and click New SSO:
46
+ - Provider URL (e.g., ` https://keycloak.example.com/realms/yourrealm ` )
47
+ - Name (e.g., ` Keycloak ` )
48
+ - Client ID
49
+ - Client secret
50
+ - Click save
51
51
52
- 5 . After saving, click on the three dots and choose ** Edit** to open the newly SSO entry.
52
+ 5 . After saving, click on the three dots and choose Edit to open the new SSO entry.
53
53
54
- 6 . Copy the generated ** Callback URL** from Libredesk.
54
+ 6 . Copy the generated Callback URL from Libredesk.
55
55
56
- 7 . Back in Keycloak, edit the client and add the ** Callback URL** to ** Valid Redirect URIs** :
56
+ 7 . Back in Keycloak, edit the client and add the Callback URL to Valid Redirect URIs:
57
57
- e.g., ` https://ticket.example.com/api/v1/oidc/1/finish `
0 commit comments