Skip to main content
Version: 26.1

User authentication

Authorization Hub authenticates users through Keycloak. You can use a standard username-and-password flow, or preferably, integrate with an external Identity Provider (IdP) to centralize user management and streamline the login experience.

If you don't configure an IdP, Keycloak applies a default password policy during account setup. To modify these settings, read the Password policy section below.

note

Only Tenant admins can perform the procedures in this section.

Access Keycloak

Follow the steps below to access the Keycloak administration console:

  1. Append ../auth/admin/hub/console/ to your Authorization Hub deployment URL.
  2. Log in to your Authorization Hub account if you haven't already done so.
  3. The Keycloak console will open with the Authorization Hub realm selected by default.

You are now ready to perform any of the procedures listed below.

Important

Only the Keycloak settings explicitly described in the Authorization Hub documentation are supported. Axiomatics assumes no liability for the use of non-documented configuration options.

Password policy

Keycloak enforces a default password policy when users set up their accounts. The policy requires:

RequirementSpecification
LengthA minimum of 12 characters
NumbersAt least one digit
UppercaseAt least one uppercase letter
Special charactersAt least one symbol (!, @, #, etc.)

If the default password policy does not meet your organization's security requirements, follow these steps to modify it.

  1. In the Keycloak menu, under Configure, click Authentication.
  2. Switch to the Policies tab.
  3. Adjust the values according to your requirements.
  4. Click Save to apply your updated password policy.

Integrate Identity Providers (IdP)

tip

We recommend configuring an Identity Provider (IdP) before inviting users.

Connecting an IdP lets users log in through your existing enterprise identity system instead of managing a separate password for Authorization Hub. Keycloak acts as the bridge between Authorization Hub and your IdP.

  1. Set up your IdP following the Integrating identity providersOpens in a new tab instructions in the Keycloak documentation.

  2. Once the initial setup is complete, open the IdP you just configured and set the following options under Advanced settings:

    ParameterValue
    Trust EmailOn (optional)
    First login flow overridehub-first-broker-validation
    Post login flowhub-post-broker-validation
    Sync modeForce
  3. Click Save to finalize the IdP configuration.

  4. Optionally, sync the profile picture stored in the IdP as follows:

    1. Switch to the Mappers tab.

    2. Click Add Mapper and set the following:

      ParameterValue
      NameA descriptive name for this mapper
      Sync mode overrideInherit
      Social Profile JSON Field PathThe field in your IdP that holds the picture URL. For Google, this is picture.
      User Attribute Namepicture
    3. Click Save to store the mapper configuration.

After configuration, the login screen shows the IdP login button alongside the standard username and password fields.

In environments where an IdP is configured, new users invited to the Authorization Hub receive an email instructing them to log in using the IdP. Otherwise, the email prompts users to set up their password.

info

If a user was invited before an IdP was enabled and logged in with a username and password, the system will automatically link their account when they next sign in using an IdP.