This guide shows how to integrate Wiki.js with Keycloak using OpenID Connect (OIDC) so that users can log in using the central Keycloak identity provider.
Benefits:

Key points:
https://wiki.example.net/login/<instance-id>/callback
Web origins:
https://wiki.example.net
| Mapper | Token claim | Notes |
|---|---|---|
username |
User property | Required for login |
email |
User property | Optional but recommended |
full name |
name | Optional but recommended |
1. Authentication → OpenID Connect → Keycloak strategy
2. Fill in:
| Field | Value | Notes |
|---|---|---|
| Host | https://keycloak.example.net | fully qualified url |
| Realm | <your realm> |
|
| Client ID | <your client id> |
what you configured in keycloak |
| Client Secret | <secret> |
Keycloak / client settings / credentials |
| Authorization URL | https://keycloak.example.net/realms/<realm>/protocol/openid-connect/auth |
|
| Token URL | https://keycloak.example.net/realms/<realm>/protocol/openid-connect/token |
|
| UserInfo URL | https://keycloak.example.net/realms/<realm>>/protocol/openid-connect/userinfo |
|
| Scopes | openid profile email |
|
| Self-registration | ON | to allow keycloak to create users |
| Default group | <Wiki.js internal group> (e.g., “Readers”) |
3. Save & Apply the configuration.
4. Test login: new Keycloak users are automatically created and assigned to the default group.