User Experience
Updated On 08 October 2024 | Min(s) read

Integrating Keycloak with OpenID Connect

Transact Explorer is integrated with Keycloak for Single Sign-On (SSO), which also supports user externalisation. You can configure a user in the external system instead of configuring them in Transact, enabling Transact Explorer to support both Transact and Non-Transact user configurations. For a Transact user, you need to set the Pre-authenticated attribute in the USER application in Transact.

If the user needs to externalise, enable the user externalisation attribute in Transact during deployment.

Interested in knowing more about the externalisation attributes, read our Externalising Configurable Properties guide.

Transact Explorer can be integrated with keycloak using the Temn OpenID Connect (OIDC) component or directly using the angular keycloak library.

The format of the url for launching keycloak is https://<dns>:<port>/.

Integrating Using TemnOIDC Component

This section provides detailed steps to configure Keycloak, TB-server, and Transact Explorer to enable the SSO feature.

Integrating Keycloak Directly

Transact Explorer does not use browser sessions to store any data except for SSO integration with OIDC, where TemnOIDC stores the token details in a session. Hence sticky sessions are necessary when transact explorer is deployed in a multi-server architecture with a load balancer. To avoid the stickiness, Transact Explorer can be integrated directly with keycloak using the Angular Keycloak library. This library retrieves the token directly and eliminates the need for browser session storage.

Configuring Keycloak Server, Configuring API war (tb-server.war), Configuring Users in Transact remain the same as in TemnOIDC component. To configure transact-explorer-wa.war, you can use JVM option or appconfig.json.

Verifying Keycloak Integration

To verify the Keycloak integration,

  1. Launch http://localhost:9089/transact-explorer-wa. The Keycloak realm login page appears.
  2. Enter the credentials of the user created in the Keycloak server.
  3. After successful login, Transact Explorer home page for the AUTHOR user whose sign-on name is the Keycloak login user appears. Refer to the Configuring Users in Transact section for more information.

Copyright © 2020- Temenos Headquarters SA

Published on :
Tuesday, April 1, 2025 6:06:53 PM IST