Posted On 16.12.2025

How We Integrated Jenkins with Keycloak

0 comments
confdroid.com >> blog >> How We Integrated Jenkins with Keycloak

Intro

Managing Jenkins users can get messy, especially with multiple teams. By integrating Jenkins with Keycloak via OpenID Connect (OIDC), we can use a single set of credentials and centrally manage access.

Why OIDC with Keycloak?

  • Single sign-on across tools
  • Centralized user/group management
  • Easy mapping to Jenkins roles

The Setup

  1. Keycloak Client: Jenkins is registered as an OIDC client. Redirects and secrets are configured.
  2. Jenkins Plugin: The OpenID Connect plugin allows Jenkins to delegate authentication to Keycloak.
  3. Authorization: Project-based matrix is used. Local admin is retained for fallback, and Keycloak-authenticated users can run all jobs.

Results

  • Users can log in with existing Keycloak accounts
  • No need to maintain separate Jenkins credentials
  • Role mapping allows fine-grained control

Conclusion:

Integrating Jenkins with Keycloak is straightforward and makes user management much easier. Using OIDC ensures secure, standardized authentication while keeping Jenkins projects protected.

Fore more detailed setup instructions, head to my wiki.

Found this helpful? You can support me:

Author Profile

12ww1160DevOps engineer & architect

Leave a Reply

Your email address will not be published. Required fields are marked *

twenty − nineteen =

Related Post

Importing Puppet modules to Foreman

In order for Foreman to be able to work with our Puppet modules, we'll need…

Puppet Infrastructure Options

Puppet is a powerful framework to allow for centralized configuration management and infrastructure as code…

Kubernetes – VM vs Bare Metal

As mentioned here, the series about Kubernetes goes right ahead as planned.While the main topic…
Social Media Auto Publish Powered By : XYZScripts.com