CDNetworks Documentation IAM User Guide Example of Using Keycloak for SAML SSO

Example of Using Keycloak for SAML SSO

Last update:2026-03-25 15:25:41

Operation Guide

Keycloak Deployment and Installation

For more information, please refer to Installation and Deployment Process.

Log in to Keycloak and Configure the Application

  1. Log in to the Keycloak platform using your administrator account.

Update to Chinese Display Name for Security Products

  1. Create a new Realm.

Update to Chinese Display Name for Security Products

  1. After the creation is complete, go to Realm settings, download the initial metadata, and click [SAML 2.0 Identity Provider Metadata].

Update to Chinese Display Name for Security Products

  1. Log in to the CDNetworks console and configure the Item provider.
    Select SSO Type as Role SSO and upload the IdP metadata file downloaded in Step 3.

Note: After completing all configurations, you must update the metadata document again.
Update to Chinese Display Name for Security Products

  1. Obtain the SP metadata.
    In the CDNetworks console, click “View” to enter the Provider page and download the SP metadata document.
    Update to Chinese Display Name for Security Products

  2. Create a push client. You can quickly create and upload SP metadata using the “Import push client” feature.

Note: The push client import function is only supported in Chrome browser. Otherwise, you will receive the error “Object.hasOwn is not a function”.

Update to Chinese Display Name for Security Products

After a successful import, the Client ID will be detected automatically. Please click Save and proceed to the push client configuration page.

Update to Chinese Display Name for Security Products

You can also find the corresponding Client ID in the push client list and enter the configuration page.

Update to Chinese Display Name for Security Products

  1. Configure access settings.
    After importing the XML file, the system will automatically generate a Client ID and a valid redirect URI. The information that needs to be configured on this page includes:
  • Root URL
  • Home URL
  • IDP-initiated SSO URL Name. Directly enter the Realm Name; the complete IDP-initiated SSO URL will be displayed below.
  • Enter the main Domain in Root URL and input the URI part in Home URL as shown below:

Update to Chinese Display Name for Security Products

  1. Configure the SAML Function.
    Select username as the Name ID Format, keep the other parameters as default, and click Save to complete the configuration.

Update to Chinese Display Name for Security Products

  1. Go to the Client scopes tab to modify the relevant configuration.
    Change the Assigned type of role_list from default to Optional.

Update to Chinese Display Name for Security Products

Go to the current client-specific configuration file and set Full scope allowed to Off, as shown below:

Update to Chinese Display Name for Security Products
Update to Chinese Display Name for Security Products

  1. Create a user for logging in to Keycloak.
    Create a user in the Users section and set a password. The Username field here must be consistent with the account name in the CDNetworks console.
    Reference: Create User

Update to Chinese Display Name for Security Products

You can set the password in the Credentials tab.

Update to Chinese Display Name for Security Products

  1. Go to the Clients configuration page, locate the Client scopes tab, and enter the dedicated configuration file.

Update to Chinese Display Name for Security Products

In Mappers, add two custom configurations. Click Configure new mapper, and in the pop-up window, select Hardcoded Attribute.

Update to Chinese Display Name for Security Products
Update to Chinese Display Name for Security Products

First configuration:

  • Name: https://login.cdnetworks.com/SAML/Attributes/RoleSessionName
  • The attribute value can be set to any value; we recommend using the Realm name (for example, KeycloakMock).
    Click Save.

Update to Chinese Display Name for Security Products

Return to the Mappers page, click Add Mapper, and select By Configuration. In the pop-up window, choose Hardcoded Attribute.

Update to Chinese Display Name for Security Products

Second configuration:

  • Name: https://login.cdnetworks.com/SAML/Attributes/LoginName
  • Property value:
    • wsc:iam::web host account:login-name/current login account
    • wsc:iam::web host account:saml-provider/identity provider name

Example:
The main account is keycloak, the sub-account is keycloakMock, and the identity provider name is Mock.
If all users are sub-accounts keycloakMock, configure as
wsc:iam::keycloak:login-name/keycloakMock, wsc:iam::keycloak:saml-provider/Mock
If all users are main accounts keycloak, configure as
wsc:iam::keycloak:login-name/keycloak, wsc:iam::keycloak:saml-provider/Mock

  1. After completing all configurations, download the new metadata file and upload it to the CDNetworks console. The steps are the same as in Step 3.

Update to Chinese Display Name for Security Products

Access Test

In the Clients list, locate the newly added Client ID and find the corresponding Home URL. Click Access to be redirected to the Keycloak login page.

Update to Chinese Display Name for Security Products

Enter the created username and password, and check if you can successfully redirect to the CDNetworks console.

Update to Chinese Display Name for Security Products

Is the content of this document helpful to you?
Yes
I have suggestion
Submitted successfully! Thank you very much for your feedback, we will continue to strive to do better!