US English (US)
FR French
DE German
PL Polish
SE Swedish
FI Finnish

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

English (US)
US English (US)
FR French
DE German
PL Polish
SE Swedish
FI Finnish
  • Log in
  • Home
  • Identity Governance and Administration (IGA)
  • IGA solution library
  • Instructions & guidelines
  • Configure authentication

Configure: Secure Access (ESA) with Keycloak as IdP

Learn how to configure the Secure Access using another Keycloak as identity provider

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Service Management
    Matrix42 Professional Solution Matrix42 Core Solution Enterprise Service Management Matrix42 Intelligence
  • Identity Governance and Administration (IGA)
    IGA overview IGA solution library
  • Platform
    ESM ESS2 ESS Efecte Chat for Service Management Integrations Add-ons
  • Release Notes for M42 Professional, IGA, Conversational AI
    2026.1 2025.3 2025.2 2025.1 2024.2 2024.1 2023.4 2023.3 2023.2 2023.1 2022.4 2022.3 Release Information and Policies
  • Other Material
    Terms & Documentation Guidelines Accessibility Statements
  • Services
+ More
    • Service Management

    • Identity Governance and Administration (IGA)

    • Platform

    • Release Notes for M42 Professional, IGA, Conversational AI

    • Other Material

    • Services

Configure: Secure Access (ESA) with Keycloak as IdP

Learn how to configure the Secure Access using another Keycloak as identity provider

How to Configure Authentication for Keycloak 

This article contains instructions for configuring Secure Access component to be able to authenticate Customers end-users to Matrix42 Pro and IGA solutions (like for example IGA, ITSM etc.), using Keycloak as identity provider. 

 

Configurations by Customer to IdP Keycloak

Customer need to create OpenID Connect Client to their IdP Keycloak, in order for it to work as IdP for Secure Access.

  1. Login to IdP Keycloak
  2. Select correct Realm
  3. Go to Clients
  4. Create client
    Select client type OpenID Connect
    Set descriptive Client ID
    Click Next
  1. Set Client authentication On
    Click Next
     
  1. Set Valid redirect URIs and Valid post logout redirect URIs

Set Valid redirect URIs by copying Redirect URI from Secure Access Identity provider which you create on next chapter. So you need to set this Valid redirect URI together with Matrix42 when they know it from Secure Access side.

Set Valid post logout redirect URIs, to be for example your company home page.

Web origins should be set automatically, if not, set it correctly manually.
 

 
 

Step-by-Step Instructions

  1. Add customers Keycloak https certificate to Secure Access (ESA) keystore
    Add customers Keycloak https certificate to Secure Access (ESA) keystore, to enable Secure Access connect to customers Keycloak. This can be done only by Matrix42 persons, as access to host is needed for this. See guidance: https://docs.efecte.com/internal-configuration-instructions/iga-faq chapter How to add certificate to ESA.

    Note

    If this certificate is not installed before continuing to next steps, Secure Access is not able to fetch information from IdP Keycloak using discovery endpoint url.

     

 

  1. Login with ESA Admin (main.admin) to URL domain.com/auth/admin
  2.  Select correct realm from the left top corner

     
  3. Open Identity Provider settings from the left side panel

     
  4.  Add new provider by selecting Keycloak OpenID Connect
  1. Name identity provider (as you want)
  1. Add URLs for authentication. 
    It is recommended to use discovery endpoint of IdP Keycloak to auto populate those url's with correct values. Customer should give this url, it is on format: https://customeridpkeycloak.com/auth/realms/REALMNAMEHERE/.well-known/openid-configuration
    To use discovery endpoint, set Use discovery endpoint to On and set correct url.



    After that those url's are auto populated.


     
  2.  Optional: Validate signatures can be enabled, customer provides the URL for JWKS

     
  1. Add Client secret and password (customer provides these from IdP Keycloak)

     
  1. Scroll down and choose Add button (it saves the identity provider)
  2. Check these settings from Identity provider you just created

     
  3. Set Do not Store Users to On


13. After above configuration is done, a new login button appears on the ESA login page, that fordwards you to customers Keycloak login page

14. Test Login and Logout with more than one account

 
 

Secure Access (ESA) mappers configuration

After using new button to login, below screen is visible on the screen, it means, ESA needs further configuration for the mappers.

                    

In order to pass the User from ESA to other systems (ESM, ESS, IGA) - ESA must be aware of context of the User. For that purpose, ESA stores a bit of metadata, describing each User which attempted to login.

Screen above is showing, because ESA is unable to retrieve all of the needed data from Identity Provider and it is asking the User to manually input all required data.

We can overcome that, and prepare an automation which will automatically map attributes with data coming from the IdP Keycloak, to attributes required by ESA User.

  1. Login with ESA Admin (main.admin) to URL domain.com/auth
     
  2. Open Identity Provider settings from the left side panel

     
     
  3. Select Identity provider you did for this Keycloak authentication on previous steps
  4. Go to Mappers tab. Here is an example of how they should be defined. 
    Use same attribute names and friendly names as they have been configured to Keycloak being IdP.
    Mappings can differ between different environments, so it is also important to discuss what claims IdP Keycloak is sending and how those should be mapped.

    Following three example mappings work in case where IdP Keycloak email claim can be set to email, upn and username attributes.
  • For email use the mapper type Attribute Importer and Sync mode override Force.

     

 

  • For username use the mapper type Username Attribute Importer and Sync mode override Force.
     


 

  • For upn use the mapper type Username Attribute Importer and Sync mode override Force.
     


 

Note!

Do notice that Secure Access, to have full understanding of the User requires TWO mandatory mappings: username and email attributes. 

After these steps:

  • Make sure that a Person datacard is created in ESM.
  • Make sure that Person has right value in servlet.auth.person.uid.attribute.code - it will be used later on, as a login name.

Validate/set that you have configured logout url correctly to scc and/or esm depending on where users are going with this authentication.

When above steps are completed, during login process, ESM will create missing User object, link it with already existing Person - and proceed to startup page of ITSM for given role.

 
 

Keycloak OpenID Connect Identity provider example

 
 

Troubleshooting

If you see this screen after authenticating against IdP Keycloak

Then issue is most likely that claims mappings doesn't match between Secure Access and IdP Keycloak. Check/fix configurations on both sides.


If you see this screen after authenticating against IdP Keycloak, it means that Secure Access needs further configuration for the mappers. Check also Claim configurations on IdP Keycloak side.

 
 

 

 

integrate: keycloak setup: esa keycloak

Was this article helpful?

Yes
No
Give feedback about this article

Table of Contents

Related Articles

  • Secure Access - Customer instructions for Entra ID configuration OpenID Connect (OIDC)

Copyright 2026 – Matrix42 Professional.

Matrix42 homepage


Knowledge Base Software powered by Helpjuice

0
0
Expand