Introduction
In a previous article, I explained how to integrate Keycloak with Auth0 using Keycloak’s native Identity Brokering capabilities. That approach required manual configuration within the Keycloak Admin Console.
In this article, we will explore a more streamlined method — configuring similar integration using the SSO feature available in the Skycloak Console.
Skycloak enables organizations to leverage the full power of open-source Keycloak without the operational overhead of installing, maintaining, scaling, and securing production-grade deployments. Through predefined templates, the Skycloak Console simplifies complex configurations such as Identity Brokering while still relying on Keycloak’s native capabilities underneath.
In this guide, we will:
- Use the OIDC template for Auth0
- Configure Auth0 as an external Identity Provider
- Automatically provision a Keycloak Identity Broker
- Test authentication using the built-in Keycloak Account Console
Architecture Overview
This integration involves three core components:
- OIDC Client in Keycloak
We will use the built-in Account Console client for simplicity. - Keycloak Identity Broker
Created via the Skycloak Console’s SSO feature. - External Identity Provider (Auth0)
An OIDC application registered in Auth0.
Keycloak will act as an Identity Broker, delegating authentication to Auth0 while maintaining control over user provisioning and session management.
Step 1: Configure the OIDC Application in Auth0
From the Auth0 Dashboard:
- Navigate to Applications
- Click Create Application
- Select Regular Web Application
- Click Create
Configure the Following Settings
You will need to define:
Allowed Callback URL
https://<your-keycloak-hostname>/realms/<your-realm>/broker/auth0/endpoint
⚠️ This value must exactly match the Redirect URL displayed in the Skycloak SSO template.
Allowed Logout URL
https://<your-keycloak-hostname>/realms/<your-realm>/broker/auth0/endpoint/logout_response
Allowed Web Origin
https://<your-keycloak-hostname>
Finally, copy the following values — they will be required during broker configuration:
- Client Secret
- Client ID
Step 2: Configure the Identity Broker Using Skycloak Console

Now we configure Keycloak’s Identity Brokering via the Skycloak Console.
- Select your cluster
- Select the appropriate realm
- In the left menu, click SSO
- Click Add Provider
You will see a rich list of predefined templates.
Select:
Auth0 (OIDC Template)
Provide Required Configuration
You will need:
- Client ID (from Auth0)
- Client Secret (from Auth0)
- OIDC Discovery URL
The Discovery URL format is typically:
https://<your-auth0-tenant>.auth0.com/.well-known/openid-configuration
If region-specific:
https://<tenant>.<region>.auth0.com/.well-known/openid-configuration
Click Auto-Detect to fetch endpoints automatically.
Once completed:
- Click Test Connection
- Ensure the connection succeeds
- Click Save and Enable
At this point, Skycloak creates a fully configured Identity Provider inside Keycloak.
More details on OIDC discovery endpoint is available here.

Step 3: Attribute Mapping During First Login
When a user logs in via Auth0 for the first time, Keycloak can:
- Create a local user
- Map attributes
- Assign roles
- Link accounts
To configure attribute mapping:
Navigate to the Keycloak Admin Console
Identity Providers → auth0 → Mappers → Add Mapper
You can define:
- Username mapping
- Email mapping
- Custom claims mapping etc.
Since my previous article mentioned in the introduction has more details on attribute mapping, it is not repeated here.
Step 4: Test the Integration
Open the Keycloak Account Console:
https://<keycloak-hostname>/realms/<realm-name>/account/
You should now see:
Sign in with Auth0
Authentication Flow
- User clicks Sign in with Auth0
- Browser redirects to Auth0
- User authenticates at Auth0
- Auth0 redirects back to Keycloak
- Keycloak creates the user (on first login)
- Session is established
Keycloak remains the central IAM authority while delegating authentication to Auth0.
What Makes the Skycloak Approach Different?
Traditionally, configuring Identity Brokering in Keycloak requires:
- Manual endpoint configuration
- Careful validation of redirect URLs
- Increased risk of misconfiguration
The Skycloak SSO template approach provides:
- Predefined provider templates
- Automatic endpoint detection
- Built-in validation
- Reduced configuration errors
- Faster onboarding of external IdPs
This is particularly valuable in enterprise environments managing multiple external Identity Providers.
Summary
In this article, we demonstrated how to configure Identity Brokering between Keycloak and Auth0 using the Skycloak Console’s SSO template.
Key takeaways:
- Auth0 acts as the external Identity Provider.
- Keycloak acts as the Identity Broker.
- Skycloak simplifies broker configuration using templates.
- The underlying implementation still relies on Keycloak’s native Identity Brokering capabilities.
This approach enables organizations to maintain centralized IAM control while leveraging external authentication providers in a clean, maintainable, and production-ready manner.
About Skycloak
If you’re new to Skycloak, visit the Skycloak Getting Started Guide to learn more and securing your Keycloak deployments.
Skycloak is a fully managed Keycloak platform hosted in the cloud. It enables organizations to leverage the power of open-source Keycloak IAM without the operational overhead of installing, maintaining, and scaling production-grade Keycloak environments—delivered securely and cost-effectively.