Keycloak
This guide explains how to configure Keycloak as an OIDC identity provider for Voquill Enterprise. Keycloak is an open-source identity provider that can be self-hosted.
Prerequisites
Section titled “Prerequisites”- A running Keycloak instance
- Voquill Enterprise gateway running
- Admin access to both Keycloak and the Voquill admin panel
Keycloak Configuration
Section titled “Keycloak Configuration”1. Create a Realm
Section titled “1. Create a Realm”- Log into the Keycloak admin console
- Click the dropdown in the top-left (shows “Keycloak” or “master”)
- Click Create realm
- Enter a name (e.g.,
voquillor your company name) - Click Create
2. Create a Client
Section titled “2. Create a Client”- Go to Clients → Create client
- Fill in:
- Client ID:
voquill-desktop - Click Next
- Client ID:
- Client authentication settings:
- Client authentication: ON
- Click Next
- Login settings:
- Valid redirect URIs:
https://your-gateway-url/auth/oidc/callback - Click Save
- Valid redirect URIs:
3. Get the Client Secret
Section titled “3. Get the Client Secret”- Go to the Credentials tab of your client
- Copy the Client secret
4. Create Users
Section titled “4. Create Users”- Go to Users → Add user
- Fill in:
- Username: (required)
- Email: (required for Voquill)
- First name / Last name: (optional)
- Click Create
- Go to the Credentials tab
- Click Set password
- Enter a password and turn off Temporary
- Click Save
Voquill Configuration
Section titled “Voquill Configuration”Add the Identity Provider
Section titled “Add the Identity Provider”- Open the Voquill admin panel
- Go to Identity Providers
- Click Add Provider
- Fill in:
| Field | Value |
|---|---|
| Name | Keycloak (or your company name) |
| Issuer URL | https://your-keycloak-url/realms/{realm-name} |
| Client ID | voquill-desktop (or whatever you named it) |
| Client Secret | The secret from Keycloak |
| Enabled | Yes |
- Click Save
Test the Flow
Section titled “Test the Flow”- Open the Voquill desktop app
- Connect to your enterprise server
- You should see an SSO button with your provider name
- Click it to authenticate via Keycloak
- Sign in with your test user
- You’ll be redirected back and logged into Voquill
Troubleshooting
Section titled “Troubleshooting””Discovery failed” or connection errors
Section titled “”Discovery failed” or connection errors”- Verify the Issuer URL is exactly correct (no trailing slash)
- Check that the realm name matches
- Ensure the gateway can reach Keycloak (network/firewall)
“Redirect mismatch” error
Section titled ““Redirect mismatch” error”The redirect URI in Keycloak must match exactly: http(s)://gateway-url/auth/oidc/callback
- Check http vs https
- Check the port number
User not found after login
Section titled “User not found after login”- Ensure the Keycloak user has an email address set
- The OIDC flow requires the
emailclaim