Paul, I reviewed what I've done for my POC for Keycloak OIDC some time ago:
1) coded my own method as a close copy of the Google one, put it into "mycustom/keycloak/KeycloakOpenIdConnect" file in the EDX Platform 2) Added this parameters that make their way into lms.env.json EDXAPP_THIRD_PARTY_AUTH_BACKENDS: ['mycustom.keycloak.KeycloakOpenIdConnect', 'third_party_auth.lti.LTIAuthBackend'] EDXAPP_SOCIAL_AUTH_OAUTH_SECRETS: { keycloak-openidconnect: '<code censored>' } 3) After the app start with the new configuration above, navigate to the Django Admin, e.g., http://myurl:18000/admin/third_party_auth/oauth2providerconfig/ Click on “Add Provider Configuration … ” at the top right Check “Enabled”, enter the name – it shows on the icon in the default implementation, check “Visible” Select Backend name from the dropdown: “keycloak-openidconnect” should be available, enter the same exact string into the Provider slug Enter Client ID “myid” – same as defined in the Keycloak Realm Client setup, leave the Secret blank and enter Kecloak URL into Other Settings: { "BASE_URL": "http://myurl:8080" } This "BASE_URL" is a Settings parameter I use in my custom provider program, the Client ID would also be Keycloak specific. I eventually coded a management method to automate this vs. going through the Admin console. I think that's pretty much all I've done (lots of debugging along the way across multiple packages) Stan On Saturday, November 17, 2018 at 3:15:24 AM UTC+8, Paul Kimmel wrote: > > Stan: > > Got the third party auth configuring individual providers--no 500. My OIDC > provider doesn't show up though. Is that configured in a different list or > in a different place in the lms.env.json file? > > Paul > > >>> >>> -- You received this message because you are subscribed to the Google Groups "General Open edX discussion" group. To view this discussion on the web visit https://groups.google.com/d/msgid/edx-code/210777d5-aafb-4b1c-a8f9-361e9de5bb97%40googlegroups.com.