-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Keycloak automatic provisioning of users/groups (via SCIM) to AWS IAM Identity Center #73
Comments
Any news here? I would also be interested. |
Expecting feedback from @blarghmatey and team |
I can't speak specifically to AWS, but the SCIM plugin does hook into the user federation functionality. That allows create and update events to be automatically propagated through SCIM from Keycloak. |
I tried this plugin with AWS and the setup works partially. Looks like there is a problem on AWS side. Users and Groups are propagated from keycloak to AWS Identity Center successfully (very nice!!). But when plugin tries to propagate group memberships to AWS, the AWS responds with 404. I used plugin from commit b947704 released on 17th August 2024 and I was using keycloak version 23.0.6 Full log of creating a group, a user and adding user to group is attached. To highlight the problematic part, here is log from keycloak, specifically the plugin sends group membership correctly:
But gets 404 response from AWS IAM Identity Center (the group and user were created there successfully) so group membership change fails:
Full log attached as file. |
Hi Team,
We are using keycloak 20.0.3 as the IDP with AWS IAM Identity Center(SSO). We are using SCIM protocol to sync users and groups from keycloak to AWS SSO. But this sync does not work automatically. We have to invoke scim endpoint periodically to do the sync.
Does this new keycloak SCIM plugin or any keycloak version supports automatic provisioning of Users and Groups to AWS SSO using SCIM?
Thanks,
Jitendra
The text was updated successfully, but these errors were encountered: