CDNetworks Documentation IAM User Guide Example of Using Keycloak for OIDC SSO

Example of Using Keycloak for OIDC SSO

Last update:2026-03-25 15:16:54

Procedure

Keycloak Deployment and installation

For details, see: Installation and Publish process

User OIDC connection to CDNetworks configuration

1. The administrator or management account logs in to the Keycloak Platform
【产品维护】云安全产品维护公告
2. Create a new Realm
【产品维护】云安全产品维护公告
On the Create realm page, enter Realm name as oidc_shengbo, and then click Create to create a new Realm named oidc_shengbo. Realm represents the tenant in Keycloak.
3. In the drop-down list in the upper left corner of the page, select the created oidc_shengbo, select Users in the left navigation bar, and then click Add user.
【产品维护】云安全产品维护公告
4. On the Create user page, enter Username as shengbo. Other options are optional. After setting, click Create to create user shengbo.
5. On the shengbo page, click Attributes, add the relevant attributes of user shengbo, set the Key to name, the Value to ack, and then click Save. This attribute can be injected into the ID Token.
【产品维护】云安全产品维护公告
6. On the shengbo page, click Credentials, and then click Set Password.
7. Set Temporary to On when setting the password, then click Save. You will need to change the password after logging in for the first time.
【产品维护】云安全产品维护公告
The address for logging in to Keycloak is https://${Keycloak edgeHostname}/realms/${user realm}/account.

Client Settings

Client is the client that requests Keycloak to authenticate the user. After the user settings are completed, you need to complete the Client settings.
1. Select Clients in the left navigation bar of the oidc_shengbo page, and then click Create client on the Clients page.
2. On the Create client page, set General Settings, Capability config, and Login settings.
a. On the General Settings page, set the Client ID and Name. In this example, set them to shengbo, and then click Next.
【产品维护】云安全产品维护公告

b. On the Capability config page, set Client authentication to on, which means setting the Client access type to confidential. Keep other options as default, and then click Next.
【产品维护】云安全产品维护公告

c. On the Login settings page, set Valid redirect URIs to https://login.cdnetworks.com/cas/login?client_name=oidc_shengbo&service=https://dash.cdnetworks.com/ to match all HTTP redirect URLs. Then click Save.
【产品维护】云安全产品维护公告

Client scopes settings

Client scopes are a set of common protocol Mappers and Roles shared among multiple client.
1. Select Client scopes in the left navigation bar of the oidc_shengbo page, and then click Create client scope on the Client scopes page.
2. On the Create client scope page, set Name to shengbo, keep other configuration items as default, and then click Save.
【产品维护】云安全产品维护公告
3. On the shengbo page, click Mappers, and then click Configure a new mapper.
4. On the Configure a new mapper page, create a User Attribute to inject user attributes into the ID Token, namely the name and ack fields added in step 6 above.
【产品维护】云安全产品维护公告
5. On the Add mapper page, set Name to name, User Attribute to name (name: ack attribute set above), and Token Claim Name to name (name of the attribute in the token). Keep other configuration items as default. Then click Save.
【产品维护】云安全产品维护公告
6. In the left navigation bar, click Clients to return to the Clients page, and then select the Client named shengbo.
7. On the client page of shengbo, click Client scopes, then click Add client scope. In the pop-up dialog box, select the Client scope to be added, and then click Add.
【产品维护】云安全产品维护公告

Configure OIDC information in CDNetworks console

See: 《OIDC Configuration for SP》

Is the content of this document helpful to you?
Yes
I have suggestion
Submitted successfully! Thank you very much for your feedback, we will continue to strive to do better!