Skip to content
psunix edited this page Apr 6, 2021 · 9 revisions

With Version > 3.6 Cryptopus supports Single-Sign-On (SSO) with OpenID Connect / Keycloak

General integration

Cryptopus expects an ID-Token containing a claim named cryptops_pk_secret_base with a 32 characters longs alphanumeric secret for each user.

Setup with Keycloak

Check Keycloak Development Setup for a working example using Keycloak.

This Setup with Keycloak is based on RandomString OIDC Mapper.

Create a custom openid connect attribute

Mainpage

  • Token Claim Name: cryptopus_pk_secret_base
  • User Attribute Name for random string: cryptopus.pk_secret_base

Cryptopus Auth Config

override existing config/auth.yml:

provider: openid-connect

oidc:
  client_id: cryptopus
  host: my-keycloak
  host_port: 443
  host_scheme: https
  secret: 'my-oidc-secret'
  authorization_endpoint: '/auth/realms/my-realm/protocol/openid-connect/auth'
  token_endpoint: '/auth/realms/my-realm/protocol/openid-connect/token'
  user_subject: preferred_username
  certs_url: https://my-keycloak/auth/realms/my-realm/protocol/openid-connect/certs
  additional_scopes:
    - email

Further Resources

Clone this wiki locally