...
Open the Keycloak administration console
Open the “Client Scopes” tab
Click “Create”
Enter the following information:
Name: modelop_client
Description: A ModelOp custom scope used to distinguish between an OAuth2 client and an end-user
Protocol: openid-connect
Display On Consent Screen: OFF
Include in Token Scope: ON
GUI order:
Click “Save”
Defining Users group claim:
Use: https://modelopdocs.atlassian.net/wiki/spaces/dv32/pages/1770651659/Keycloak+How-to#Create-a-group-mapper If imported users contain already a field to be used as the ModelOp Center group.
Use: https://modelopdocs.atlassian.net/wiki/spaces/dv32/pages/1770651659/Keycloak+How-to#Create-a-group-mapper-with-a-hardcoded-value if imported users are missing the field to be used as ModelOp Center group.
Create a group mapper
Open the Keycloak administration console
Open the “User Federation” tab
Select the LDAP provider
Open the “Mappers” tab
Click “Create”
Enter the following information:
Name: modelOpGroups
Mapper Type: user-attribute-ldap-mapper
User Model Attribute: memberOf
LDAP Attribute: <Enter the name of the mapped attribute on LDAP object containing the user’s groups>
Read Only: ON
Always Read Value From LDAP: ON
Is Mandatory in LDAP: OFF
Is Binary Attribute: OFF
Click “Save”
...