Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
The Keycloak connector uses OpenID Connect. Keycloak publishes a standard OIDC discovery endpoint per realm, making it straightforward to integrate with the Orchestrator — whether Keycloak is self-hosted or running in a managed environment.Use Cases
- Unify SSO with open-source identity — Extend Keycloak authentication to legacy and enterprise applications, delivering seamless SSO for organizations that prefer open-source identity infrastructure
- Rationalize commercial IdP costs — Use Keycloak as a cost-effective replacement for commercial identity platforms, orchestrating gradual migration without disrupting application access
- Self-hosted identity resilience — Deploy Keycloak as a self-hosted failover IdP alongside a primary SaaS provider, ensuring authentication continuity even during cloud provider outages
- On-premises and private-cloud identity — Connect to Keycloak deployments running in private environments where a SaaS IdP is not an option, bridging air-gapped or regulated infrastructure with modern applications
Configuration
- Console UI
- Configuration
To create a Keycloak (OIDC) connector in the Maverics Console:
- Navigate to Identity Fabric in the Console sidebar.
- Click Create and select Keycloak (OIDC).
- Enter a Name — this is the friendly name that identifies your provider.
- Enter the OIDC Well Known URL — for Keycloak, this follows the pattern
https://{host}/realms/{realm}/.well-known/openid-configuration. - Enter the OAuth Client ID — the client ID of the Maverics application registered in your Keycloak realm.
- Enter the OAuth Client Secret — the client secret from the Keycloak client configuration.
- Under Redirect URLs, add the callback URL where Keycloak will redirect after authentication. This URL must match the Valid Redirect URIs configured in your Keycloak client.
- Optionally configure Logout Callback URLs for single logout support.
- Optionally set Scopes (space-separated). Default scopes are typically
openid profile email. - The PKCE toggle is enabled by default. Disable it only if your Keycloak client is not configured to support Proof Key for Code Exchange.
- Optionally enable Offline Access for token refresh support (Proxy apps only).
- Click Save.
Troubleshooting
- Verify the well-known URL is accessible from the Orchestrator host — ensure the Keycloak host and realm name are correct
- Ensure the redirect URL matches exactly what is registered in the Keycloak client under Valid Redirect URIs
- Check that the client secret reference resolves correctly via your secret provider
- Confirm the Keycloak realm is active — disabled or misconfigured realms will cause OIDC discovery to fail