Member-only story
AWS — User federation using Keycloak & OpenId
8 min readJun 5, 2020
If you are not a medium member yet, please use the link here to access it for free
Previously, I had shared the article where one could federate the user to AWS using SAML IDP flow.
And this article focuses on federating the user to AWS using OpenID Connect.
This solution is little complex than the previous as it requires a broker, between Keycloak and AWS
Prerequisites
- You should have the real urge to do federation between an identity provider and AWS using OpenID.
- Have some knowledge of — AWS, AWS IAM, OpenID, Access and Identity Management as general topic, Keycloak, etc.
- Keycloak version 10 or later, already running separately. I used patchy keycloak version 10 while doing all this. And could not wait for version 11.0.0’s release as there was an important blocker issue in version 10.0.1.
- Basic knowledge of Java(and Spring boot), required for the Broker application.
Scope
- Configuration setup of OpenID Identity Provider on the AWS side.
- Role management on the AWS IAM side.
- Configuration setup on the Keycloak side.
- And mapping of the users/ groups/…