Dans votre virtualhost, il faut les directives suivantes :

  OIDCProviderMetadataURL http://192.168.9.165:8080/auth/realms/Shura/.well-known/openid-configuration

  OIDCClientID "ka.local"
  OIDCClientSecret "d36e706f-faaf-460b-8b85-ec226afc0799"
  OIDCCryptoPassphrase "shawapouf"
  OIDCScope "openid email profile email"
  OIDCSessionType client-cookie

  OIDCRemoteUserClaim sub
  OIDCOAuthRemoteUserClaim sub
  OIDCSSLValidateServer Off

  OIDCPassClaimsAs "headers"
  OIDCPassUserInfoAs "claims"
  OIDCPassRefreshToken "On"
  OIDCClaimPrefix Oidc-Claim-

  OIDCRedirectURI http://ka/sfhp/redirect_uri

  DocumentRoot /var/www/html/

  ProxyPreserveHost On
  SSLProxyCheckPeerCN off

  ProxyPass /sfhp http://ka:5000/
  ProxyPassReverse /shfp http://ka:5000/

  <Location />
     AuthType openid-connect
     Require valid-user

     Redirect /sfhp/oidc/ /oidc/
  </location>

Les ip et crédentials oidc doivent être conformes à celles déclarées dans votre keycloak