You need to enable JavaScript to run this app.
IAM

IAM

Copy page
Download PDF
Example
Example of Configuring SAML Role SSO with KeyCloak
Copy page
Download PDF
Example of Configuring SAML Role SSO with KeyCloak
operation
  1. In KeyCloak, view and save the KeyCloak IDP metadata file as an XML file

  1. In Volcano Engine - Access Control, create a new identity provider , select SAML for the identity provider type, download the service provider metadata file for the Volcano Engine role SSO, and save it as an XML file. Upload KeyCloak IDP metadata file.

alt

  1. In Volcano Engine - Access Control, create a new role , select "Identity Provider" for the trust identity type and "SAML" for the identity provider type, select the identity provider for which the role SSO has been created, and configure the role to correspond to the role name and corresponding authorization. Save the role TRN information for later configuration.

alt

  1. Add the client side in KeyCloak and upload the service provider metadata file for the Volcano Engine user SSO.


alt

  1. To set up client side related information, please refer to the following:
  • Client side ID: Automatically recognized by the service provider metadata file of the Volcano Engine role SSO, it is the entityID provided by Volcano Engine.

  • Name ID Format: transient

  • Valid Redirect URIs: https://signin.volcengine.com/saml/sso, ACS URL provided by Volcano Engine

  • Root URL (Base URL): Fill in the "IDP initiated SSO URL name" and intercept the root URL in "Target IDP initiated SSO URL".

  • IDP Initiated SSO URL Name: volcengine_role

  1. Configure KeyCloak role information: Add a role in the client side created by KeyCloak, the role name is the role TRN, and the format is: trn: iam:: $ {AccountID}: role/ ${RoleName}, trn: iam:: $ {AccountID}: saml-provider/ ${SAMLProviderName}. Where AccountID is your Volcano Engine account ID, RoleName is the IAM role name, and SAMLProviderName is the identity provider name, separated by English commas.

  1. Configure KeyCloak assertion properties: Create assertion properties on the client side where KeyCloak has been created. Assertion attributes include at least the identity attribute and the session name attribute.

    If the service provider metadata file for uploading Volcano Engine user SSO has been automatically generated, it needs to be deleted and recreated.

    1. Create identity attributes, and refer to the following for configuration information:
      1. Name:https://www.volcengine.com/SAML/Attributes/Identity
      2. Mapper Type: Role list
      3. Role attribute name:https://www.volcengine.com/SAML/Attributes/Identity
      4. Friendly Name: identity
      5. SAML Attribute NameFormat: Basic

    1. Create the session name property, and refer to the following for configuration information:
      1. Name: https://www.volcengine.com/SAML/Attributes/SessionName
      2. Mapper Type: User Properties.
      3. Attribute: username.
      4. Friendly Name: SessionName
      5. SAML Attribute Name: https://www.volcengine.com/SAML/Attributes/SessionName
      6. SAML Attribute NameFormat: Basic
    2. Turn off full range mapping
    3. In the KeyCloak created client side - client side template, delete the role_list in the Assigned Default Client Scopes.

  1. Configure KeyCloak user information: Add user "Zhang San", configure login password information, and configure the user's role mapping information, select client side created role to add.

Result verification

Initiate single sign-on from KeyCloak:

  1. Click the created client side root URL in KeyCloak.


2. Enter the username and password of the created KeyCloak user

3. Successfully login to Volcano Engine

Initiate single sign-on from Volcano Engine:

  1. Select "Corporate Federated Login" on the Volcano Engine login page, select the account and identity provider you need to log in to, and click "Login Now".

  1. Enter the username and password of the created KeyCloak user


3. Successfully login to Volcano Engine

Last updated: 2025.06.30 10:38:46