Creating a Client in digiRunner and Connecting to Keycloak via GTW OAuth 2.0 IdP
This section explains how to create a client in digiRunner and configure it to integrate with Keycloak using the GTW OAuth 2.0 IdP mechanism. This setup enables secure API access through OpenID Connect (OIDC).
Creating an API Client in digiRunner
Log in to the digiRunner Admin Console, and go to Client Management > API Client to access the client management page.
Click Create to access the client creation page, and fill in the fields as instructed below:
Client name: Enter a meaningful name to identify the client.
Display name and Client ID (username): It is recommended to keep these values consistent with the Client name for easier management.
Password and Confirm password: Enter and confirm a password for the client.
Note: Optional. Add any remarks or labels for reference.
Status: Set to Active to enable the client.
API Audience: Keep the default setting unless customization is required.
Click Create to complete the client creation.


Configuring the Redirect URI for Postman Testing
Once the client is created, return to the API Client list.
Locate the newly created client and click on the
(Security) icon to access security settings.

In the Default Redirect URI field, enter the following URL:
https://oauth.pstmn.io/v1/callback. This is Postman’s default callback URL for receiving authorization responses.Click Update to apply the changes.

Configuring the GTW OAuth 2.0 IdP for Keycloak Integration
First, go to Client Management > GTW OAuth 2.0 IdP to access the IDP management page.
Select the corresponding client and click on the
(Details) icon to view the IDP integration settings.

Click Create to access the integration configuration page, and fill in the fields as instructed below:

Enable: Set to
Yto activate the IDP integration.Type: Select OIDC (OpenID Connect) from the drop-down menu.
IdP Client ID: Enter the Client ID previously configured in Keycloak.
IdP Client Name: Optional. Enter a meaningful name to identify the IdP integration.
IdP Client Secret: Enter the Client Secret copied from Keycloak.
dgR Callback URL: Enter the following callback URL for digiRunner, the callback endpoint where digiRunner receives the authorization response:
https://{{ip}}:{{port}}/dgrv4/ssotoken/gtwidp/OIDC/gtwIdPCallbackIdP Well Known URL: Enter the Well-Known URL of Keycloak, the URL used to automatically discover the OpenID configuration:
http://{{ip}}:{{port}}/realms/D5SIT/.well-known/openid-configurationIdP Scope: Enter the following scopes: openid email profile, the scope required to retrieve basic user information during authentication.
Once all fields are configured, click Create to complete the IdP integration setup.

Last updated
Was this helpful?
