{% capture givenname %}
### X500 givenName
{% image sso/cheatsheets/saml-keycloak/x500-givenname.png %}
{% endcapture %}
{{ givenname | markdownify}}
{% capture surname %}
### X500 surname
{% image sso/cheatsheets/saml-keycloak/x500-surname.png %}
{% endcapture %}
{{ surname | markdownify}}
{% capture email %}
### X500 email
{% image sso/cheatsheets/saml-keycloak/x500-email.png %}
{% endcapture %}
{{ email | markdownify}}
{% capture groups %}
### groups
{% image sso/cheatsheets/saml-keycloak/groups.png %}
{% endcapture %}
{{ groups | markdownify}}
{% capture roles %}
### role list
{% image sso/cheatsheets/saml-keycloak/rolelist.png %}
{% endcapture %}
{{ roles | markdownify}}
### Download your Certificate
From the navigation, select **Realm Settings** → **Keys** and get your certificate:
{% image sso/cheatsheets/saml-keycloak/keycloak-getcert.png Get Keycloak Certificate %}
Copy the certificate for use in a [later step](#identity-provider-configuration).
## Back to the Business Portal
At this point, you've configured everything you need within the context of the Keycloak Portal. Jump back over to the Bitwarden Business Portal to complete configuration.
The Business Portal separates configuration into two sections:
- **SAML Service Provider Configuration** will determine the format of SAML requests.
- **SAML Identity Provider Configuration** will determine the format to expect for SAML responses.
### Service Provider Configuration
Configure the following fields:
|Field|Description|
|-----|-----------|
|Name ID Format|Select the Name ID Format you chose when [configuring the Keycloak client](#settings).|
|Outbound Signing Algorithm|The algorithm Bitwarden will use to sign SAML requests.|
|Signing Behavior|Whether/when SAML requests will be signed.|
|Minimum Incoming Signing Algorithm|Select the algorithm the Keycloak client is [configured to use](#settings) to sign SAML documents or assertions.|
|Want Assertions Signed|Whether Bitwarden expects SAML assertions to be signed. If toggled on, make sure you configure the Keycloak client to [sign assertions](#settings).|
|Validate Certificates|Check this box when using trusted and valid certificates from your IdP through a trusted CA. Self-signed certificates may fail unless proper trust chains are configured with the Bitwarden Login with SSO docker image.|
When you're done with the Service Provider Configuration section, **Save** your work.
### Identity Provider Configuration
Identity Provider Configuration will often require you to refer back to the Keycloak Portal to retrieve client values:
|Field|Description|
|-----|-----------|
|Entity ID|Enter the URL of the Keycloak realm on which the client was created, for example `https://