The SSO login page for Otomi is served by Keycloak. It is used as an identity broker or provider for all Otomi integrated applications. Keycloak is configured with mappers that normalize incoming identities from an IDP to have predictable claims format to be used by Otomi applications.
Keycloak is automatically configured with 3 roles:
otomi-admin: super admin role for all platform configuration and core applications
team-admin: team admin role to manage teams and users
team: team role for team members
Group (team) membership is reflected in the user's 'groups' claim. When this authorization configuration is useful to their own built applications, teams can directly use Keycloak's provided groups and roles claims. There is no need for a client or token validation, as that has been done by the platform. They can do so by turning on the "Authenticate with Single Sign On" checkbox. This then limits the application access to only allow the members of the team.
When there are different requirements to use Keycloak for business applications, Keycloak's designated "master" and "otomi" realms may not be used, and an additional realm needs to be created. We refer to the keycloak docs for any custom configuration targeting business applications.
Default admin account
Step 2: Create a user in Keycloak
To create users in Keycloak, follow these steps:
- Open the Keycloak app
- Click on "Administration Console"
- Login with admin credentials (using
adminuser and password provided in the installer log or the
otomi.adminPasswordprovided in the initial values)
- Select the "Otomi" realm
- Click on "Users" then "Add user"
- Fill in a user name in the "Username" field
- Fill in your email address in the "Email" field
- Select the "otomi-admin" group
- Click on "Save"
- Choose the "Credentials" tab and then fill in a password for this user
- Click on "Set Password"