Posted On 16.12.2025

How We Integrated Jenkins with Keycloak

0 comments
confdroid.com >> blog >> How We Integrated Jenkins with Keycloak

Intro

Managing Jenkins users can get messy, especially with multiple teams. By integrating Jenkins with Keycloak via OpenID Connect (OIDC), we can use a single set of credentials and centrally manage access.

Why OIDC with Keycloak?

  • Single sign-on across tools
  • Centralized user/group management
  • Easy mapping to Jenkins roles

The Setup

  1. Keycloak Client: Jenkins is registered as an OIDC client. Redirects and secrets are configured.
  2. Jenkins Plugin: The OpenID Connect plugin allows Jenkins to delegate authentication to Keycloak.
  3. Authorization: Project-based matrix is used. Local admin is retained for fallback, and Keycloak-authenticated users can run all jobs.

Results

  • Users can log in with existing Keycloak accounts
  • No need to maintain separate Jenkins credentials
  • Role mapping allows fine-grained control

Conclusion:

Integrating Jenkins with Keycloak is straightforward and makes user management much easier. Using OIDC ensures secure, standardized authentication while keeping Jenkins projects protected.

Advertisements

Fore more detailed setup instructions, head to my wiki.

Found this helpful? You can support me:

[![“Buy Me A Coffee”](https://www.buymeacoffee.com/assets/img/custom_images/orange_img.png)](https://www.buymeacoffee.com/grizzly_coda)

Author Profile

12ww1160DevOps engineer & architect

Advertisements

Leave a Reply

Your email address will not be published. Required fields are marked *

13 + 10 =

Related Post

ConfDroid Puppet Modules – Gitea

ConfDroid Gitea Module – Self-Hosted Git Made Easy with Puppet We’re continuing the ConfDroid Puppet…

Puppet Infrastructure Options

Puppet is a powerful framework to allow for centralized configuration management and infrastructure as code…

ClamAV – Linux antivirus and malware protection

So you are using Linux in your infrastructure and want to protect it against malware.…