Activating SSO Login in Flight Deck
After successful configuration of an SSO method as described in Setting up Keycloak, an SSO login can be activated for quintessence users in Keycloak.
Set Up quintessence Identity Provider
This is how the SSO login for the quintessence-managed Identity Provider (IdP) can be set up.
- From the left-hand navigation menu, select Identity Providers.
- Under User-defined, select SAML v2.0.
- Change alias to
saml_qc. - Provide Infra with:
- redirect URI (note: after saving, the URL part "saml" changes to the alias)
- service provider entity ID
- Request Infra to provide you with:
- metadata URL of Azure
- Add the provided metadata to SAML entity descriptor.
- Select Add and set:
- NameID policy format: Email
- First login flow: QC first broker login (creates user on first login)
- Save.
Add Mappers
Username Mapper
| Field | Definition |
|---|---|
| Name | SAML-Username-Sub |
| Mapper type | Username Template Importer |
| Template | ${NAMEID \ localpart} |
JIT Mapper This setting defines that a user will be created on first login.
| Field | Definition |
|---|---|
| Name | jit |
| Sync mode override | Force |
| Mapper type | Hardcoded Attribute |
| User Attribute | jit |
| User Attribute Value | true |
User Group Mapper
This setting defines which Flight Deck group the user should be assigned to on every login. Make sure that the group defined in the environment corresponds to the group defined as the User Attribute, as different group definitions may exist.
Important
Group assignment will be hard-configured on the user's first login. To revert, remove the mapper and the attributes from the user in Keycloak.
| Field | Definition |
|---|---|
| Name | qcintern |
| Sync mode override | Force |
| Mapper type | Hardcoded Attribute |
| User Attribute | samlGroup |
| User Attribute Value | DEF_QCIntern |
Set Up Customer Identity Provider
This is how the SSO for a customer-managed Identity Provider (IdP) can be set up.
- Provide the customer with Keycloak redirect URI and service provider entity ID for each environment.These details can be found at Keycloak > Realm > Identity Providers > Add Providers > SAML 2.0
- Request the customer to choose one of the provided SSO provisioning strategies. A reference to the chapter "Choose the right approach" in the User Documentation can be helpful. This documentation is accessible from Flight Deck; additionally, accessible internally from the Documentation Space in SharePoint.
- According to the customer's choice, the following steps need to be taken by the customer:
- Standard SSO: Customer creates users and assigns groups in Flight Deck.
- Just-in-time provisioning:
- Customer creates a group in Flight Deck for each group in IdP.
- Customer configures the IdP to include each group in the SAML token.
- Customer configures a SAML SSO client in their IdP and provides us with the App Federation Metadata URL for each environment (internal test, external test, stage, ref, prod).
- Customer configures a test user for QC in their IdP.
- Customers follows the steps in the user documentation according to the chosen strategy.
- Configure the SSO button using the App Federation Metadata URL provided by the customer:
- Navigate to SAML as described above.
- Select Add and set:
- NameID policy format: Email
- First login flow: QC first broker login (creates user on first login)
- Save.
- Add the following mappers as needed.
Add Mappers
Scroll to the top and switch to the Mappers tab.
Username Mapper
| Field | Definition |
|---|---|
| Name | SAML-Username-Sub |
| Mapper type | Username Template Importer |
| Template | ${NAMEID \ localpart} |
JIT Mapper This mapper is only necessary with just-in-time provisioning.
| Field | Definition |
|---|---|
| Name | JIT |
| Sync mode override | Force |
| Mapper type | Hardcoded Attribute |
| User Attribute | jit |
| User Attribute Value | map |
Attribute Import Mapper
| Field | Definition |
|---|---|
| Name | Attribute-Import-Mapper |
| Sync mode override | Force |
| Mapper type | Attribute Importer |
| Attribute Name Friendly Name |
http://schemas.microsoft.com/ws/2008/06/identity/claims/groups |
| Name Format | ATTRIBUTE_FORMAT_BASIC |
| User Attribute Name | SamlGroup |
Changelog
| Date | Author | Message |
|---|---|---|
| 2026-03-04 | aresnikowa | qc-0: postediting |
| 2026-03-04 | aresnikowa | QC-47927: aligned with the template, mkDocs formatting alignment |
| 2026-02-25 | aresnikowa | QC-50171: in Keycloak folder, adjusted admonitions |
| 2026-02-25 | aresnikowa | Merge remote-tracking branch 'origin/master' |