+
+{% capture givenname %}
+### X500 givenName
+
+{% image sso/cheatsheets/saml-keycloak/x500-givenname.png %}
+
+{% endcapture %}
+{{ givenname | markdownify}}
+
+
+{% capture surname %}
+### X500 surname
+
+{% image sso/cheatsheets/saml-keycloak/x500-surname.png %}
+
+{% endcapture %}
+{{ surname | markdownify}}
+
+
+{% capture email %}
+### X500 email
+
+{% image sso/cheatsheets/saml-keycloak/x500-email.png %}
+
+{% endcapture %}
+{{ email | markdownify}}
+
+
+{% capture groups %}
+### groups
+
+{% image sso/cheatsheets/saml-keycloak/groups.png %}
+
+{% endcapture %}
+{{ groups | markdownify}}
+
+
+{% capture roles %}
+### role list
+
+{% image sso/cheatsheets/saml-keycloak/rolelist.png %}
+
+{% endcapture %}
+{{ roles | markdownify}}
+
+
+
+### Download your Certificate
+
+From the navigation, select **Realm Settings** → **Keys** and get your certificate:
+
+{% image sso/cheatsheets/saml-keycloak/keycloak-getcert.png Get Keycloak Certificate %}
+
+Copy the certificate for use in a [later step](#identity-provider-configuration).
+
+## Back to the Business Portal
+
+At this point, you've configured everything you need within the context of the Keycloak Portal. Jump back over to the Bitwarden Business Portal to complete configuration.
+
+The Business Portal separates configuration into two sections:
+
+- **SAML Service Provider Configuration** will determine the format of SAML requests.
+- **SAML Identity Provider Configuration** will determine the format to expect for SAML responses.
+
+### Service Provider Configuration
+
+Configure the following fields:
+
+|Field|Description|
+|-----|-----------|
+|Name ID Format|Select the Name ID Format you chose when [configuring the Keycloak client](#settings).|
+|Outbound Signing Algorithm|The algorithm Bitwarden will use to sign SAML requests.|
+|Signing Behavior|Whether/when SAML requests will be signed.|
+|Minimum Incoming Signing Algorithm|Select the algorithm the Keycloak client is [configured to use](#settings) to sign SAML documents or assertions.|
+|Want Assertions Signed|Whether Bitwarden expects SAML assertions to be signed. If toggled on, make sure you configure the Keycloak client to [sign assertions](#settings).|
+|Validate Certificates|Check this box when using trusted and valid certificates from your IdP through a trusted CA. Self-signed certificates may fail unless proper trust chains are configured with the Bitwarden Login with SSO docker image.|
+
+When you're done with the Service Provider Configuration section, **Save** your work.
+
+### Identity Provider Configuration
+
+Identity Provider Configuration will often require you to refer back to the Keycloak Portal to retrieve client values:
+
+|Field|Description|
+|-----|-----------|
+|Entity ID|Enter the URL of the Keycloak realm on which the client was created, for example `https://