LettermintLettermint
  • Knowledge base
  • Community
  • Changelog
  • Support
  • Documentation
  • Sending API
  • Team API
Getting started
Guides
Platform
    Projects & Routes
    Emails
    Domains
    Webhooks
    Teams
      Team API
      Team members
      SSO
        SSOGoogle Workspace SSOMicrosoft Entra ID SSOOkta SSOZITADEL SSOauthentik SSOKeycloak SSOcidaas SSOOry SSOSignicat SSOCustom OIDC SSOCustom SAML SSO
      SCIMSpend Limits
Resources
SSO

Keycloak SSO

Use this guide when your organization signs in with Keycloak. Lettermint connects to a Keycloak OpenID Connect client.

Before you start

You need access to the Keycloak realm that should authenticate Lettermint users. Keycloak recommends using specific HTTPS redirect URIs for production web applications.

Keycloak setup

  1. Open the Keycloak Admin Console.
  2. Select the realm used by your organization.
  3. Create an OpenID Connect client for Lettermint.
  4. Configure the client as confidential.
  5. Add the Lettermint OIDC callback URL from the SSO guide to Valid redirect URIs.
  6. Copy the client ID and client secret.
  7. Note the realm URL.

Lettermint setup

In the Lettermint SSO setup screen, choose Keycloak and enter:

FieldValue
DomainYour managed email domain, for example example.com.
Metadata URLhttps://{instance}/realms/{realm}/.well-known/openid-configuration
Client IDThe Keycloak client ID.
Client secretThe Keycloak client secret.

Replace {instance} with your Keycloak hostname and {realm} with the realm name.

References

  • Keycloak: Managing OpenID Connect clients
  • Keycloak: Redirect URI guidance
Last modified on May 19, 2026
authentik SSOcidaas SSO
On this page
  • Before you start
  • Keycloak setup
  • Lettermint setup
  • References