https://console.aws.amazon.com/cognito/users/orbit-{YOUR_ENV_NAME})General settings, get the Pool Id of the User Pool and save it for laterGeneral settings > AttributesAdd custom attribute and then save it.
App integration > Domain name
If you already have a KeyCloak implementation, sign in and skip this topic.
REALM you’d like to use, or create a new oneClients -> Create upload the AWS SAML Metadata Fileurn:amazon:webservicesurn:amazon:cognito:sp:us-west-2_xxxxxxxxx (Replace xxxxxxxxx with the UserPoolId you got above)Click Create
*
Fetch the SAML-Metadata-IDPSSODescriptor.xml file from your KeyCloak Server
https://{keycloak-server}/auth/realms/{realm}/protocol/saml/descriptor (change the DNS of your server and the realm)https://console.aws.amazon.com/cognito/users/orbit-{YOUR_ENV_NAME})keycloak. For more information, see Choosing SAML Identity Provider Names.For more information, see Creating and managing a SAML identity provider for a user pool (AWS Management Console).
groups.custom:groups from the list.emailaddress.Email from the list.email_verified.Email Verified from the list.username.Preferred User Name from the list.
For more information, see Specifying identity provider attribute mappings for your user pool.
Parameter Store{your-env-name}/contextPool Id of the User PoolCognitoExternalProviderDomain and CognitoExternalProviderRedirect with your configurations:UserPoolId: us-west-X_xXXXxxXXx
CognitoExternalProvider: keycloak
CognitoExternalProviderLabel: KEYCLOAK
# The domain created in Coginto
CognitoExternalProviderDomain: domain.auth.region.amazoncognito.com
# The Orbit Workbench URL
CognitoExternalProviderRedirect: https://a12389bc893fa0980ce08f1000ecf89a.region.elb.amazonaws.com/orbit/login
orbit deploy env -f YOUR_FILE.yaml
You should see a ‘Sign in with Keycloak’ button on the landing page
Sign in with Keycloak