/realms/*) to Keycloak internally. This means you only need to expose the Central Backend and Central UI; no separate ingress or service is needed for Keycloak.
Odigos Central supports two types of external SSO providers:
- OIDC — for providers like Azure AD, Auth0, or any OpenID Connect-compatible IdP
- SAML — for providers like Okta that use SAML 2.0
Configuring the External URL
For SSO redirects to work, Keycloak and the Central Backend must know the browser-accessible URL of the Central Backend. This is set via theauth.externalUrl Helm value.
| Environment | auth.externalUrl value |
|---|---|
| Local dev / port-forward | http://localhost:8081 (default) |
| Ingress with HTTPS | https://central.example.com |
| LoadBalancer service | https://central-lb.prod.internal |
- CLI
- Helm
When
auth.externalUrl is empty (the default), it falls back to http://localhost:8081, which works for local development with odigos pro central ui port-forwarding.OIDC Provider Setup (Azure AD, Auth0, etc.)
Create the OIDC Identity Provider in the Central UI
Open the Central UI sign-in page, choose your OIDC provider (e.g., Azure AD), and fill in:
- Client ID — from your IdP application
- Client Secret — from your IdP application
- Discovery URL — your IdP’s OpenID Connect discovery endpoint
- Tenant ID — (if required by the provider)
Odigos Central will create/update the required configuration in the bundled Keycloak for you. Avoid configuring the identity provider directly in Keycloak unless you’re troubleshooting.
Copy the Callback URL
After the provider is created successfully, the Central UI will display a Callback URL. Copy this URL and add it to your IdP application settings as the Redirect URI (or Callback URL).
SAML Provider Setup (Okta, etc.)
Create the SAML Identity Provider in the Central UI
Open the Central UI sign-in page, choose SAML, and fill in the IdP details from your SAML provider:
- IdP Entity ID / Issuer
- Single Sign-On Service URL
- X.509 Signing Certificate
Odigos Central will create/update the required configuration in the bundled Keycloak for you. Avoid configuring the identity provider directly in Keycloak unless you’re troubleshooting.
Copy the Callback URL (ACS URL)
After the provider is created, the Central UI will display the Callback URL (ACS URL). Copy this URL and configure it in your SAML provider:
- Single sign-on URL (ACS URL)
- Audience URI (SP Entity ID) — use the same URL or the realm URL depending on your provider
Production Ingress Configuration
When deploying behind an ingress, route traffic to the Central Backend and Central UI services only. Keycloak does not need its own ingress — the Central Backend handles all/realms/* requests internally.
Example routing:
| Path | Service | Port |
|---|---|---|
/ | central-ui | 3000 |
/api/*, /graphql, /realms/* | central-backend | 8081 |
If you’re looking to enable OIDC for the non-central Odigos UI (not Odigos
Central), see the dedicated OIDC documentation:
OIDC (OpenID Connect).