Configure the Third-Party Application

After configuring the MATRIXX web apps, you must configure the third-party identity and access control application. This example is specific to Keycloak.

Procedure

  1. Create the MATRIXX user roles in the third-party application.
    See the discussion about defining MATRIXX roles for OAuth 2.0 authorization for more information.
  2. Configure the third-party application for integration with the MATRIXX web apps.
    For example, in Keycloak, configure the client objects matrixx and matrixx-public with the following settings:
    Table 1. Keycloak Configuration
    Setting matrixx matrixx-public
    Valid Redirect URIs * http://host:port/matrixxbct/*
    Web Origins N/A +
    Access Type confidential public
    Client Protocol openid-connect openid-connect
    Standard Flow Enabled On On
    Note: The matrixx-public values apply to MATRIXX Backoffice Customer Tool only.

What to do next

Important: In production, the Valid Redirect URIs setting for the matrixx and matrixx-public clients should be restricted to the public home page URLs for My MATRIXX, MATRIXX Backoffice Customer Tool, and RS Gateway. If you get an error indicating that Keycloak configuration was not completed when logging in to the web application, confirm that you have configured the following values for the Keycloak client configured in settings.json:
  • Valid redirect URIs
  • Web origins