Unlock a world of possibilities! Login now and discover the exclusive benefits awaiting you.
This is a quick guide on how to set up SAML authentication in Qlik Cloud using Keycloak as the Identity Provider.
Add https://<tenant URL>/login/saml in Valid redirect URIs and in Master SAML Processing URL
In Settings, under SAML capabilities, set the Name ID format to persistent and make sure that Force POST binding is checked.
Hi, I followed this method but when I validate, I'm correctly redirected to keycloak but I get this error:
{ "status": "callbackError", "protocol": "SAML", "error": "SAML Response validation failed, unable to query 'Attributes'", "traceId": "e5df8289a6302b5cfd7a6f365fa83eef" }
(picture below)
Any advice for the resolution? We also tried connecting with OIDC but got a similar error.
Thank you very much,
Gianluca
Since we got a few reports of that error recently, we would like to investigate if that is due to a defect or a configuration problem.
Could you please open a support case and provide us with all information listed in the below article so that we can investigate?
Hi damien,
I indeed did it, it seems deleting role_list scope in client_scopes made it work.
Now I don't get groups mapped from keycloak to qlik and I'd like to map to the full name instead of firstName, I asked this into the issue also, but maybe these are more related to this page.
Thank you!
Gianluca
For groups it's straightforward, in Keycloak scopes, choose "Add mapper" "By configuration" "Group list", choose "Single group attribute" and input a name for the attribute.
In the Qlik Console Identity Providers configuration, make sure that you have the same attribute name in the "groups" fields.
Also in the Qlik Console settings section, make sure that "Creation of groups" is enabled.
For the full name it's a bit more complicated in recent versions of Keycloak since it seems they removed the Javascript mapper. The easiest would be to sync the full name from a directory service.