Keycloak OIDC
Configure Single Sign-On (SSO) with Keycloak for React Native Stallion using OpenID Connect.
Free for All Plans:
SSO is available for free on all React Native Stallion plans.
Keycloak OIDC Setup
This guide walks you through configuring SSO with Keycloak as your identity provider.
Prerequisites
- Admin access to your Keycloak instance
- Admin access to your Stallion organization
Step 1: Create a New Client in Keycloak
- Log in to your Keycloak Admin Console
- Select your realm (or create a new one)
- Navigate to Clients → Create client
- Configure the client:
- Client type: OpenID Connect
- Client ID:
stallion-sso
- Click Next
Step 2: Configure Client Settings
Configure the following settings:
| Setting | Value |
|---|---|
| Client authentication | ON |
| Valid redirect URIs | https://api.stalliontech.io/api/v1/sso/auth/login/callback |
| Valid redirect URIs | https://api.stalliontech.io/api/v1/sso/auth/finalize/callback |
| Web origins | https://api.stalliontech.io |
Click Save.
Step 3: Gather OIDC Configuration
- Go to Clients → stallion-sso → Credentials tab
- Copy the Client secret
- Note down the following values:
| Value | Description |
|---|---|
| Client ID | stallion-sso (or your chosen ID) |
| Client Secret | From Credentials tab |
| Issuer URL | https://{your-keycloak-domain}/realms/{realm-name} |
Step 4: Configure SSO in Stallion Console
- Log in to Stallion Console
- Navigate to your Organization → SSO Settings
- Click Configure SSO
Step 4.1: Enter Configuration
Enter the following details:
| Field | Description |
|---|---|
| Domain | Your organization's email domain (e.g., yourcompany.com) |
| Org Slug | A unique identifier for your organization |
| Issuer URL | https://{your-keycloak-domain}/realms/{realm-name} |
| Client ID | From Step 3 |
| Client Secret | From Step 3 |
Click Next to proceed.
Step 4.2: Verify Domain
- Copy the provided TXT record
- Add it to your domain's DNS settings
- Wait for DNS propagation (this may take a few minutes)
- Click Verify to confirm domain ownership
Step 4.3: Finalize SSO
- Click Finalize SSO
- You will be redirected to Keycloak to log in
- Complete authentication with your Keycloak credentials
- Once successful, SSO is fully configured
Step 5: Configure User Attributes (Optional)
To pass additional user information, configure mappers in Keycloak:
- Go to Clients → stallion-sso → Client scopes tab
- Click on the dedicated scope
- Add mappers for email, name, and other required attributes
Troubleshooting
Need Help?:
If you encounter issues during setup, contact our support team at stalliontech.io/contact.