diff --git a/cypress/integration/layout.spec.js b/cypress/integration/layout.spec.js
--- a/cypress/integration/layout.spec.js
+++ b/cypress/integration/layout.spec.js
@@ -11,7 +11,7 @@
   it('should should contain all navigation links', function() {
     cy.visit(url);
     cy.get('.swh-top-bar a')
-      .should('have.length', 4)
+      .should('have.length.of.at.least', 4)
       .and('be.visible')
       .and('have.attr', 'href');
   });
diff --git a/mypy.ini b/mypy.ini
--- a/mypy.ini
+++ b/mypy.ini
@@ -21,6 +21,9 @@
 [mypy-htmlmin.*]
 ignore_missing_imports = True
 
+[mypy-keycloak.*]
+ignore_missing_imports = True
+
 [mypy-magic.*]
 ignore_missing_imports = True
 
diff --git a/requirements.txt b/requirements.txt
--- a/requirements.txt
+++ b/requirements.txt
@@ -18,6 +18,7 @@
 python-dateutil
 pyyaml
 requests
+python-keycloak >= 0.19.0
 python-memcached
 pybadges
 sentry-sdk
@@ -26,5 +27,3 @@
 # Doc dependencies
 sphinx
 sphinxcontrib-httpdomain
-
-
diff --git a/swh/web/admin/urls.py b/swh/web/admin/urls.py
--- a/swh/web/admin/urls.py
+++ b/swh/web/admin/urls.py
@@ -4,7 +4,7 @@
 # See top-level LICENSE file for more information
 
 from django.conf.urls import url
-from django.contrib.auth.views import LoginView, LogoutView
+from django.contrib.auth.views import LoginView
 from django.shortcuts import redirect
 
 from swh.web.admin.adminurls import AdminUrls
@@ -17,12 +17,11 @@
     return redirect('admin-origin-save')
 
 
-urlpatterns = [url(r'^$', _admin_default_view, name='admin'),
-               url(r'^login/$',
-                   LoginView.as_view(template_name='login.html'),
-                   name='login'),
-               url(r'^logout/$',
-                   LogoutView.as_view(template_name='logout.html'),
-                   name='logout')]
+urlpatterns = [
+    url(r'^$', _admin_default_view, name='admin'),
+    url(r'^login/$',
+        LoginView.as_view(template_name='login.html'),
+        name='login'),
+]
 
 urlpatterns += AdminUrls.get_url_patterns()
diff --git a/swh/web/assets/src/bundles/webapp/webapp.css b/swh/web/assets/src/bundles/webapp/webapp.css
--- a/swh/web/assets/src/bundles/webapp/webapp.css
+++ b/swh/web/assets/src/bundles/webapp/webapp.css
@@ -295,6 +295,11 @@
     color: #fecd1b;
 }
 
+.swh-position-left {
+    position: absolute;
+    left: 0;
+}
+
 .swh-position-right {
     position: absolute;
     right: 0;
diff --git a/swh/web/auth/__init__.py b/swh/web/auth/__init__.py
new file mode 100644
diff --git a/swh/web/auth/backends.py b/swh/web/auth/backends.py
new file mode 100644
--- /dev/null
+++ b/swh/web/auth/backends.py
@@ -0,0 +1,118 @@
+# Copyright (C) 2020  The Software Heritage developers
+# See the AUTHORS file at the top-level directory of this distribution
+# License: GNU Affero General Public License version 3, or any later version
+# See top-level LICENSE file for more information
+
+from datetime import datetime, timedelta
+from typing import Any, Dict, Optional, Tuple
+
+from django.core.cache import cache
+from django.http import HttpRequest
+import sentry_sdk
+
+from swh.web.auth.keycloak import KeycloakOpenIDConnect
+from swh.web.auth.utils import get_oidc_client
+from swh.web.auth.models import OIDCUser
+
+
+# OpenID Connect client to communicate with Keycloak server
+_oidc_client: KeycloakOpenIDConnect = get_oidc_client()
+
+
+def _oidc_user_from_info(userinfo: Dict[str, Any]) -> OIDCUser:
+    # compute an integer user identifier for Django User model
+    # by concatenating all groups of the UUID4 user identifier
+    # generated by Keycloak and converting it from hex to decimal
+    user_id = int(''.join(userinfo['sub'].split('-')), 16)
+
+    # create a Django user that will not be saved to database
+    user = OIDCUser(id=user_id,
+                    username=userinfo['preferred_username'],
+                    password='',
+                    first_name=userinfo['given_name'],
+                    last_name=userinfo['family_name'],
+                    email=userinfo['email'])
+
+    # set is_staff user property based on groups
+    user.is_staff = '/staff' in userinfo['groups']
+
+    # add userinfo sub to custom User proxy model
+    user.sub = userinfo['sub']
+
+    return user
+
+
+def _oidc_user_from_profile(oidc_profile: Dict[str, Any],
+                            userinfo: Optional[Dict[str, Any]] = None
+                            ) -> Tuple[OIDCUser, Dict[str, Any]]:
+    # get access token
+    access_token = oidc_profile['access_token']
+
+    # request OIDC userinfo
+    if userinfo is None:
+        userinfo = _oidc_client.userinfo(access_token)
+
+    # create OIDCUser from userinfo
+    user = _oidc_user_from_info(userinfo)
+
+    # decode JWT token
+    decoded_token = _oidc_client.decode_token(access_token)
+
+    # get authentication init datetime
+    auth_datetime = datetime.fromtimestamp(decoded_token['auth_time'])
+
+    # compute OIDC tokens expiration date
+    oidc_profile['access_expiration'] = (
+        auth_datetime +
+        timedelta(seconds=oidc_profile['expires_in']))
+    oidc_profile['refresh_expiration'] = (
+        auth_datetime +
+        timedelta(seconds=oidc_profile['refresh_expires_in']))
+
+    # add OIDC profile data to custom User proxy model
+    for key, val in oidc_profile.items():
+        if hasattr(user, key):
+            setattr(user, key, val)
+
+    return user, userinfo
+
+
+class OIDCAuthorizationCodePKCEBackend:
+
+    def authenticate(self, request: HttpRequest, code: str, code_verifier: str,
+                     redirect_uri: str) -> Optional[OIDCUser]:
+
+        user = None
+        try:
+            # try to authenticate user with OIDC PKCE authorization code flow
+            oidc_profile = _oidc_client.authorization_code(
+                code, redirect_uri, code_verifier=code_verifier)
+
+            # create Django user
+            user, userinfo = _oidc_user_from_profile(oidc_profile)
+
+            # save authenticated user data in cache
+            cache.set(f'user_{user.id}',
+                      {'userinfo': userinfo, 'oidc_profile': oidc_profile},
+                      timeout=oidc_profile['refresh_expires_in'])
+        except Exception as e:
+            sentry_sdk.capture_exception(e)
+
+        return user
+
+    def get_user(self, user_id: int) -> Optional[OIDCUser]:
+        # get user data from cache
+        user_oidc_data = cache.get(f'user_{user_id}')
+        if user_oidc_data:
+            try:
+                user, _ = _oidc_user_from_profile(
+                    user_oidc_data['oidc_profile'], user_oidc_data['userinfo'])
+                # restore auth backend
+                setattr(user, 'backend',
+                        f'{__name__}.{self.__class__.__name__}')
+                return user
+            except Exception as e:
+                sentry_sdk.capture_exception(e)
+                return None
+        else:
+            return None
diff --git a/swh/web/auth/keycloak.py b/swh/web/auth/keycloak.py
new file mode 100644
--- /dev/null
+++ b/swh/web/auth/keycloak.py
@@ -0,0 +1,162 @@
+# Copyright (C) 2020  The Software Heritage developers
+# See the AUTHORS file at the top-level directory of this distribution
+# License: GNU Affero General Public License version 3, or any later version
+# See top-level LICENSE file for more information
+
+from typing import Any, Dict, Optional, Tuple
+from urllib.parse import urlencode
+
+from keycloak import KeycloakOpenID
+
+
+class KeycloakOpenIDConnect:
+    """
+    Wrapper class around python-keycloak to ease the interaction with Keycloak
+    for managing authentication and user permissions with OpenID Connect.
+    """
+
+    def __init__(self, server_url: str, realm_name: str, client_id: str,
+                 realm_public_key: str = ''):
+        """
+        Args:
+            server_url: URL of the Keycloak server
+            realm_name: The realm name
+            client_id: The OpenID Connect client identifier
+            realm_public_key: The realm public key (will be dynamically
+                retrieved if not provided)
+        """
+        self._keycloak = KeycloakOpenID(
+            server_url=server_url,
+            client_id=client_id,
+            realm_name=realm_name,
+        )
+
+        self.server_url = server_url
+        self.realm_name = realm_name
+        self.client_id = client_id
+        self.realm_public_key = realm_public_key
+
+    def well_known(self) -> Dict[str, Any]:
+        """
+        Retrieve the OpenID Connect Well-Known URI registry from Keycloak.
+
+        Returns:
+            A dictionary filled with OpenID Connect URIS.
+        """
+        return self._keycloak.well_know()
+
+    def authorization_url(self, redirect_uri: str,
+                          **extra_params: str) -> str:
+        """
+        Get OpenID Connect authorization URL to authenticate users.
+
+        Args:
+            redirect_uri: URI to redirect to once a user is authenticated
+            extra_params: Extra query parameters to add to the
+                authorization URL
+        """
+        auth_url = self._keycloak.auth_url(redirect_uri)
+        if extra_params:
+            auth_url += '&%s' % urlencode(extra_params)
+        return auth_url
+
+    def authorization_code(self, code: str, redirect_uri: str,
+                           **extra_params: str) -> Dict[str, Any]:
+        """
+        Get OpenID Connect authentication tokens using Authorization
+        Code flow.
+
+        Args:
+            code: Authorization code provided by Keycloak
+            redirect_uri: URI to redirect to once a user is authenticated
+                (must be the same as the one provided to authorization_url)
+            extra_params: Extra parameters to add in the authorization request
+                payload.
+        """
+        return self._keycloak.token(
+            grant_type='authorization_code',
+            code=code,
+            redirect_uri=redirect_uri,
+            **extra_params)
+
+    def refresh_token(self, refresh_token: str) -> Dict[str, Any]:
+        """
+        Request a new access token from Keycloak using a refresh token.
+
+        Args:
+            refresh_token: A refresh token provided by Keycloak
+
+        Returns:
+            A dictionary filled with tokens info
+        """
+        return self._keycloak.refresh_token(refresh_token)
+
+    def decode_token(self, token: str,
+                     options: Optional[Dict[str, Any]] = None
+                     ) -> Dict[str, Any]:
+        """
+        Try to decode a JWT token.
+
+        Args:
+            token: A JWT token to decode
+            options: Options for jose.jwt.decode
+
+        Returns:
+            A dictionary filled with decoded token content
+        """
+        if not self.realm_public_key:
+            realm_public_key = self._keycloak.public_key()
+            self.realm_public_key = '-----BEGIN PUBLIC KEY-----\n'
+            self.realm_public_key += realm_public_key
+            self.realm_public_key += '\n-----END PUBLIC KEY-----'
+
+        return self._keycloak.decode_token(token, key=self.realm_public_key,
+                                           options=options)
+
+    def logout(self, refresh_token: str) -> None:
+        """
+        Logout a user by closing its authenticated session.
+
+        Args:
+            refresh_token: A refresh token provided by Keycloak
+        """
+        self._keycloak.logout(refresh_token)
+
+    def userinfo(self, access_token: str) -> Dict[str, Any]:
+        """
+        Return user information from its access token.
+
+        Args:
+            access_token: An access token provided by Keycloak
+
+        Returns:
+            A dictionary fillled with user information
+        """
+        return self._keycloak.userinfo(access_token)
+
+
+# stores instances of KeycloakOpenIDConnect class
+# dict keys are (realm_name, client_id) tuples
+_keycloak_oidc: Dict[Tuple[str, str], KeycloakOpenIDConnect] = {}
+
+
+def get_keycloak_oidc_client(server_url: str, realm_name: str,
+                             client_id: str) -> KeycloakOpenIDConnect:
+    """
+    Instantiate a KeycloakOpenIDConnect class for a given client in a
+    given realm.
+
+    Args:
+        server_url: Base URL of a Keycloak server
+        realm_name: Name of the realm in Keycloak
+        client_id: Client identifier in the realm
+
+    Returns:
+        An object to ease the interaction with the Keycloak server
+    """
+    realm_client_key = (realm_name, client_id)
+    if realm_client_key not in _keycloak_oidc:
+        _keycloak_oidc[realm_client_key] = KeycloakOpenIDConnect(server_url,
+                                                                 realm_name,
+                                                                 client_id)
+    return _keycloak_oidc[realm_client_key]
diff --git a/swh/web/auth/models.py b/swh/web/auth/models.py
new file mode 100644
--- /dev/null
+++ b/swh/web/auth/models.py
@@ -0,0 +1,43 @@
+# Copyright (C) 2020  The Software Heritage developers
+# See the AUTHORS file at the top-level directory of this distribution
+# License: GNU Affero General Public License version 3, or any later version
+# See top-level LICENSE file for more information
+
+from datetime import datetime
+from typing import Optional
+
+from django.contrib.auth.models import User
+
+
+class OIDCUser(User):
+    """
+    Custom User proxy model for remote users storing OpenID Connect
+    related data: profile containing authorization tokens and userinfo.
+
+    The model is also not saved to database as all users are already stored
+    in the Keycloak one.
+    """
+
+    # OIDC subject identifier
+    sub: str = ''
+
+    # OIDC tokens and session related data, only relevant when a user
+    # authenticates from a web browser
+    access_token: Optional[str] = None
+    access_expiration: Optional[datetime] = None
+    id_token: Optional[str] = None
+    refresh_token: Optional[str] = None
+    refresh_expiration: Optional[datetime] = None
+    scope: Optional[str] = None
+    session_state: Optional[str] = None
+
+    class Meta:
+        app_label = 'swh.web.auth'
+        proxy = True
+
+    def save(self, **kwargs):
+        """
+        Override django.db.models.Model.save to avoid saving the remote
+        users to web application database.
+        """
+        pass
diff --git a/swh/web/auth/utils.py b/swh/web/auth/utils.py
new file mode 100644
--- /dev/null
+++ b/swh/web/auth/utils.py
@@ -0,0 +1,62 @@
+# Copyright (C) 2020  The Software Heritage developers
+# See the AUTHORS file at the top-level directory of this distribution
+# License: GNU Affero General Public License version 3, or any later version
+# See top-level LICENSE file for more information
+
+import hashlib
+import secrets
+
+from base64 import urlsafe_b64encode
+from typing import Tuple
+
+from django.conf import settings
+
+from swh.web.auth.keycloak import (
+    KeycloakOpenIDConnect, get_keycloak_oidc_client
+)
+from swh.web.config import get_config
+
+
+def gen_oidc_pkce_codes() -> Tuple[str, str]:
+    """
+    Generates a code verifier and a code challenge to be used
+    with the OpenID Connect authorization code flow with PKCE
+    ("Proof Key for Code Exchange", see https://tools.ietf.org/html/rfc7636).
+
+    PKCE replaces the static secret used in the standard authorization
+    code flow with a temporary one-time challenge, making it feasible
+    to use in public clients.
+
+    The implementation is inspired from that blog post:
+    https://www.stefaanlippens.net/oauth-code-flow-pkce.html
+    """
+    # generate a code verifier which is a long enough random alphanumeric
+    # string, only to be used "client side"
+    code_verifier_str = secrets.token_urlsafe(60)
+
+    # create the PKCE code challenge by hashing the code verifier with SHA256
+    # and encoding the result in URL-safe base64 (without padding)
+    code_challenge = hashlib.sha256(code_verifier_str.encode('ascii')).digest()
+    code_challenge_str = urlsafe_b64encode(code_challenge).decode('ascii')
+    code_challenge_str = code_challenge_str.replace('=', '')
+
+    return code_verifier_str, code_challenge_str
+
+
+def get_oidc_client(client_id: str = '') -> KeycloakOpenIDConnect:
+    """
+    Instantiate a KeycloakOpenIDConnect class for a given client in the
+    SoftwareHeritage realm.
+
+    Args:
+        client_id: client identifier in the SoftwareHeritage realm
+
+    Returns:
+        An object to ease the interaction with the Keycloak server
+    """
+    if not client_id:
+        client_id = settings.OIDC_SWH_WEB_CLIENT_ID
+    swhweb_config = get_config()
+    return get_keycloak_oidc_client(swhweb_config['keycloak']['server_url'],
+                                    swhweb_config['keycloak']['realm_name'],
+                                    client_id)
diff --git a/swh/web/auth/views.py b/swh/web/auth/views.py
new file mode 100644
--- /dev/null
+++ b/swh/web/auth/views.py
@@ -0,0 +1,122 @@
+# Copyright (C) 2020  The Software Heritage developers
+# See the AUTHORS file at the top-level directory of this distribution
+# License: GNU Affero General Public License version 3, or any later version
+# See top-level LICENSE file for more information
+
+import uuid
+
+from typing import cast
+
+from django.conf.urls import url
+from django.core.cache import cache
+from django.contrib.auth import authenticate, login, logout
+from django.http import HttpRequest
+from django.http.response import HttpResponse, HttpResponseRedirect
+
+from swh.web.auth.models import OIDCUser
+from swh.web.auth.utils import gen_oidc_pkce_codes, get_oidc_client
+from swh.web.common.exc import handle_view_exception, BadInputExc
+from swh.web.common.utils import reverse
+
+
+def oidc_login(request: HttpRequest) -> HttpResponse:
+    """
+    Django view to initiate login process using OpenID Connect.
+    """
+    # generate a CSRF token
+    state = str(uuid.uuid4())
+    redirect_uri = reverse('oidc-login-complete', request=request)
+
+    code_verifier, code_challenge = gen_oidc_pkce_codes()
+
+    request.session['login_data'] = {
+        'code_verifier': code_verifier,
+        'state': state,
+        'redirect_uri': redirect_uri,
+        'next_path': request.GET.get('next_path'),
+    }
+
+    authorization_url_params = {
+        'state': state,
+        'code_challenge': code_challenge,
+        'code_challenge_method': 'S256',
+        'scope': 'openid',
+    }
+
+    try:
+        oidc_client = get_oidc_client()
+        authorization_url = oidc_client.authorization_url(
+            redirect_uri, **authorization_url_params)
+
+        return HttpResponseRedirect(authorization_url)
+    except Exception as e:
+        return handle_view_exception(request, e)
+
+
+def oidc_login_complete(request: HttpRequest) -> HttpResponse:
+    """
+    Django view to finalize login process using OpenID Connect.
+    """
+    try:
+        if 'login_data' not in request.session:
+            raise Exception('Login process has not been initialized.')
+
+        if 'code' not in request.GET and 'state' not in request.GET:
+            raise BadInputExc('Missing query parameters for authentication.')
+
+        # get CSRF token returned by OIDC server
+        state = request.GET['state']
+
+        login_data = request.session['login_data']
+
+        if state != login_data['state']:
+            raise BadInputExc('Wrong CSRF token, aborting login process.')
+
+        user = authenticate(request=request,
+                            code=request.GET['code'],
+                            code_verifier=login_data['code_verifier'],
+                            redirect_uri=login_data['redirect_uri'])
+
+        if user is None:
+            raise Exception('User authentication failed.')
+
+        login(request, user)
+
+        del request.session['login_data']
+
+        redirect_url = (login_data['next_path'] or
+                        request.build_absolute_uri('/'))
+
+        return HttpResponseRedirect(redirect_url)
+    except Exception as e:
+        return handle_view_exception(request, e)
+
+
+def oidc_logout(request: HttpRequest) -> HttpResponse:
+    """
+    Django view to logout using OpenID Connect.
+    """
+    try:
+        user = request.user
+        logout(request)
+        if hasattr(user, 'refresh_token'):
+            oidc_client = get_oidc_client()
+            user = cast(OIDCUser, user)
+            refresh_token = cast(str, user.refresh_token)
+            # end OpenID Connect session
+            oidc_client.logout(refresh_token)
+            # remove user data from cache
+            cache.delete(f'user_{user.id}')
+
+        logout_url = reverse('logout', query_params={'remote_user': 1})
+        return HttpResponseRedirect(request.build_absolute_uri(logout_url))
+    except Exception as e:
+        return handle_view_exception(request, e)
+
+
+urlpatterns = [
+    url(r'^oidc/login/$', oidc_login, name='oidc-login'),
+    url(r'^oidc/login-complete/$', oidc_login_complete,
+        name='oidc-login-complete'),
+    url(r'^oidc/logout/$', oidc_logout, name='oidc-logout'),
+]
diff --git a/swh/web/common/utils.py b/swh/web/common/utils.py
--- a/swh/web/common/utils.py
+++ b/swh/web/common/utils.py
@@ -343,10 +343,16 @@
     Django context processor used to inject variables
     in all swh-web templates.
     """
+    config = get_config()
+    if request.user.is_authenticated and not hasattr(request.user, 'backend'):
+        # To avoid django.template.base.VariableDoesNotExist errors
+        # when rendering templates when standard Django user is logged in.
+        request.user.backend = 'django.contrib.auth.backends.ModelBackend'
     return {
         'swh_object_icons': swh_object_icons,
         'available_languages': None,
-        'swh_client_config': get_config()['client_config'],
+        'swh_client_config': config['client_config'],
+        'oidc_enabled': bool(config['keycloak']['server_url']),
     }
 
 
diff --git a/swh/web/config.py b/swh/web/config.py
--- a/swh/web/config.py
+++ b/swh/web/config.py
@@ -110,6 +110,10 @@
     'es_workers_index_url': ('string', ''),
     'history_counters_url': ('string', 'https://stats.export.softwareheritage.org/history_counters.json'), # noqa
     'client_config': ('dict', {}),
+    'keycloak': ('dict', {
+        'server_url': '',
+        'realm_name': ''
+    }),
 }
 
 swhweb_config = {}  # type: Dict[str, Any]
diff --git a/swh/web/settings/common.py b/swh/web/settings/common.py
--- a/swh/web/settings/common.py
+++ b/swh/web/settings/common.py
@@ -45,7 +45,7 @@
     'swh.web.browse',
     'webpack_loader',
     'django_js_reverse',
-    'corsheaders'
+    'corsheaders',
 ]
 
 MIDDLEWARE = [
@@ -57,7 +57,7 @@
     'django.contrib.auth.middleware.AuthenticationMiddleware',
     'django.contrib.messages.middleware.MessageMiddleware',
     'django.middleware.clickjacking.XFrameOptionsMiddleware',
-    'swh.web.common.middlewares.ThrottlingHeadersMiddleware'
+    'swh.web.common.middlewares.ThrottlingHeadersMiddleware',
 ]
 
 # Compress all assets (static ones and dynamically generated html)
@@ -289,3 +289,10 @@
 
 CORS_ORIGIN_ALLOW_ALL = True
 CORS_URLS_REGEX = r'^/badge/.*$'
+
+AUTHENTICATION_BACKENDS = [
+    'django.contrib.auth.backends.ModelBackend',
+    'swh.web.auth.backends.OIDCAuthorizationCodePKCEBackend',
+]
+
+OIDC_SWH_WEB_CLIENT_ID = 'swh-web'
diff --git a/swh/web/settings/tests.py b/swh/web/settings/tests.py
--- a/swh/web/settings/tests.py
+++ b/swh/web/settings/tests.py
@@ -80,7 +80,11 @@
                 'exempted_networks': ['127.0.0.0/8']
             }
         }
-    }
+    },
+    'keycloak': {
+        'server_url': 'http://localhost:8080/auth',
+        'realm_name': 'SoftwareHeritage',
+    },
 })
 
 
diff --git a/swh/web/templates/layout.html b/swh/web/templates/layout.html
--- a/swh/web/templates/layout.html
+++ b/swh/web/templates/layout.html
@@ -71,6 +71,11 @@
     <div class="wrapper">
       <div class="swh-top-bar">
         <ul>
+          {% if oidc_enabled %}
+            <li class="swh-position-left">
+              <a class="swh-donate-link" href="https://www.softwareheritage.org/donate">Donate</a>
+            </li>
+          {% endif %}
           <li>
             <a href="https://www.softwareheritage.org">Home</a>
           </li>
@@ -81,9 +86,20 @@
               <a href="https://docs.softwareheritage.org/devel/">Documentation</a>
           </li>
           <li class="swh-position-right">
-            {% if user.is_authenticated and user.is_staff %}
+            {% url 'logout' as logout_url %}
+            {% if user.is_authenticated %}
               Logged in as <strong>{{ user.username }}</strong>,
-              <a href="{% url 'logout' %}">logout</a>
+              {% if 'OIDC' in user.backend %}
+                <a href="{% url 'oidc-logout' %}">logout</a>
+              {% else %}
+                <a href="{{ logout_url }}">logout</a>
+              {% endif %}
+            {% elif oidc_enabled %}
+              {% if request.path != logout_url %}
+                <a href="{% url 'oidc-login' %}?next_path={{ request.build_absolute_uri }}">login</a>
+              {% else %}
+                <a href="{% url 'oidc-login' %}">login</a>
+              {% endif %}
             {% else %}
               <a class="swh-donate-link" href="https://www.softwareheritage.org/donate">Donate</a>
             {% endif %}
@@ -160,7 +176,7 @@
                 <p>Help</p>
               </a>
             </li>
-            {% if user.is_authenticated %}
+            {% if user.is_authenticated  and user.is_staff %}
               <li class="nav-header">Administration</li>
               <li class="nav-item swh-origin-save-admin-item" title="Save code now administration">
                 <a href="{% url 'admin-origin-save' %}" class="nav-link swh-origin-save-admin-link">
diff --git a/swh/web/templates/logout.html b/swh/web/templates/logout.html
--- a/swh/web/templates/logout.html
+++ b/swh/web/templates/logout.html
@@ -17,5 +17,11 @@
 
 {% block content %}
 <p>You have been successfully logged out.</p>
-<p><a href="{% url 'login' %}">Log in</a> again.</p>
+<p>
+{% if oidc_enabled and 'remote_user' in request.GET %}
+<a href="{% url 'oidc-login' %}">
+{% else %}
+<a href="{% url 'login' %}">
+{% endif %}
+Log in</a> again.</p>
 {% endblock %}
diff --git a/swh/web/tests/auth/__init__.py b/swh/web/tests/auth/__init__.py
new file mode 100644
diff --git a/swh/web/tests/auth/keycloak_mock.py b/swh/web/tests/auth/keycloak_mock.py
new file mode 100644
--- /dev/null
+++ b/swh/web/tests/auth/keycloak_mock.py
@@ -0,0 +1,77 @@
+# Copyright (C) 2020  The Software Heritage developers
+# See the AUTHORS file at the top-level directory of this distribution
+# License: GNU Affero General Public License version 3, or any later version
+# See top-level LICENSE file for more information
+
+from copy import copy
+from unittest.mock import Mock
+
+from django.conf import settings
+from django.utils import timezone
+
+from swh.web.auth.keycloak import KeycloakOpenIDConnect
+from swh.web.config import get_config
+
+from .sample_data import oidc_profile, realm_public_key, userinfo
+
+
+class KeycloackOpenIDConnectMock(KeycloakOpenIDConnect):
+
+    def __init__(self, auth_success=True):
+        swhweb_config = get_config()
+        super().__init__(swhweb_config['keycloak']['server_url'],
+                         swhweb_config['keycloak']['realm_name'],
+                         settings.OIDC_SWH_WEB_CLIENT_ID)
+        self._keycloak.public_key = lambda: realm_public_key
+        self._keycloak.well_know = lambda: {
+            'issuer': f'{self.server_url}realms/{self.realm_name}',
+            'authorization_endpoint': (f'{self.server_url}realms/'
+                                       f'{self.realm_name}/protocol/'
+                                       'openid-connect/auth'),
+            'token_endpoint': (f'{self.server_url}realms/{self.realm_name}/'
+                               'protocol/openid-connect/token'),
+            'token_introspection_endpoint': (f'{self.server_url}realms/'
+                                             f'{self.realm_name}/protocol/'
+                                             'openid-connect/token/'
+                                             'introspect'),
+            'userinfo_endpoint': (f'{self.server_url}realms/{self.realm_name}/'
+                                  'protocol/openid-connect/userinfo'),
+            'end_session_endpoint': (f'{self.server_url}realms/'
+                                     f'{self.realm_name}/protocol/'
+                                     'openid-connect/logout'),
+            'jwks_uri': (f'{self.server_url}realms/{self.realm_name}/'
+                         'protocol/openid-connect/certs'),
+        }
+        self.authorization_code = Mock()
+        self.userinfo = Mock()
+        self.logout = Mock()
+        if auth_success:
+            self.authorization_code.return_value = copy(oidc_profile)
+            self.userinfo.return_value = copy(userinfo)
+        else:
+            self.authorization_url = Mock()
+            exception = Exception('Authentication failed')
+            self.authorization_code.side_effect = exception
+            self.authorization_url.side_effect = exception
+            self.userinfo.side_effect = exception
+            self.logout.side_effect = exception
+
+    def decode_token(self, token):
+        # skip signature expiration check as we use a static oidc_profile
+        # for the tests with expired tokens in it
+        options = {'verify_exp': False}
+        decoded = super().decode_token(token, options)
+        # tweak auth and exp time for tests
+        expire_in = decoded['exp'] - decoded['auth_time']
+        decoded['auth_time'] = int(timezone.now().timestamp())
+        decoded['exp'] = decoded['auth_time'] + expire_in
+        return decoded
+
+
+def mock_keycloak(mocker, auth_success=True):
+    kc_oidc_mock = KeycloackOpenIDConnectMock(auth_success)
+    mock_get_oidc_client = mocker.patch(
+        'swh.web.auth.views.get_oidc_client')
+    mock_get_oidc_client.return_value = kc_oidc_mock
+    mocker.patch('swh.web.auth.backends._oidc_client', kc_oidc_mock)
+    return kc_oidc_mock
diff --git a/swh/web/tests/auth/sample_data.py b/swh/web/tests/auth/sample_data.py
new file mode 100644
--- /dev/null
+++ b/swh/web/tests/auth/sample_data.py
@@ -0,0 +1,95 @@
+# Copyright (C) 2020  The Software Heritage developers
+# See the AUTHORS file at the top-level directory of this distribution
+# License: GNU Affero General Public License version 3, or any later version
+# See top-level LICENSE file for more information
+
+
+realm_public_key = (
+    'MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnqF4xvGjaI54P6WtJvyGayxP8A93u'
+    'NcA3TH6jitwmyAalj8dN8/NzK9vrdlSA3Ibvp/XQujPSOP7a35YiYFscEJnogTXQpE/FhZrUY'
+    'y21U6ezruVUv4z/ER1cYLb+q5ZI86nXSTNCAbH+lw7rQjlvcJ9KvgHEeA5ALXJ1r55zUmNvuy'
+    '5o6ke1G3fXbNSXwF4qlWAzo1o7Ms8qNrNyOG8FPx24dvm9xMH7/08IPvh9KUqlnP8h6olpxHr'
+    'drX/q4E+Nzj8Tr8p7Z5CimInls40QuOTIhs6C2SwFHUgQgXl9hB9umiZJlwYEpDv0/LO2zYie'
+    'Hl5Lv7Iig4FOIXIVCaDGQIDAQAB'
+)
+
+oidc_profile = {
+    'access_token': ('eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJPSnhV'
+                     'Q0p0TmJQT0NOUGFNNmc3ZU1zY2pqTXhoem9vNGxZaFhsa1c2TWhBIn0.'
+                     'eyJqdGkiOiIzMWZjNTBiNy1iYmU1LTRmNTEtOTFlZi04ZTNlZWM1MTMz'
+                     'MWUiLCJleHAiOjE1ODI3MjM3MDEsIm5iZiI6MCwiaWF0IjoxNTgyNzIz'
+                     'MTAxLCJpc3MiOiJodHRwOi8vbG9jYWxob3N0OjgwODAvYXV0aC9yZWFs'
+                     'bXMvU29mdHdhcmVIZXJpdGFnZSIsImF1ZCI6WyJzd2gtd2ViIiwiYWNj'
+                     'b3VudCJdLCJzdWIiOiJmZWFjZDM0NC1iNDY4LTRhNjUtYTIzNi0xNGY2'
+                     'MWU2YjcyMDAiLCJ0eXAiOiJCZWFyZXIiLCJhenAiOiJzd2gtd2ViIiwi'
+                     'YXV0aF90aW1lIjoxNTgyNzIzMTAwLCJzZXNzaW9uX3N0YXRlIjoiZDgy'
+                     'YjkwZDEtMGE5NC00ZTc0LWFkNjYtZGQ5NTM0MWM3YjZkIiwiYWNyIjoi'
+                     'MSIsImFsbG93ZWQtb3JpZ2lucyI6WyIqIl0sInJlYWxtX2FjY2VzcyI6'
+                     'eyJyb2xlcyI6WyJvZmZsaW5lX2FjY2VzcyIsInVtYV9hdXRob3JpemF0'
+                     'aW9uIl19LCJyZXNvdXJjZV9hY2Nlc3MiOnsiYWNjb3VudCI6eyJyb2xl'
+                     'cyI6WyJtYW5hZ2UtYWNjb3VudCIsIm1hbmFnZS1hY2NvdW50LWxpbmtz'
+                     'Iiwidmlldy1wcm9maWxlIl19fSwic2NvcGUiOiJvcGVuaWQgZW1haWwg'
+                     'cHJvZmlsZSIsImVtYWlsX3ZlcmlmaWVkIjpmYWxzZSwibmFtZSI6Ikpv'
+                     'aG4gRG9lIiwiZ3JvdXBzIjpbXSwicHJlZmVycmVkX3VzZXJuYW1lIjoi'
+                     'am9obmRvZSIsImdpdmVuX25hbWUiOiJKb2huIiwiZmFtaWx5X25hbWUi'
+                     'OiJEb2UiLCJlbWFpbCI6ImpvaG4uZG9lQGV4YW1wbGUuY29tIn0.neJ-'
+                     'Pmd87J6Gt0fzDqmXFeoy34Iqb5vNNEEgIKqtqg3moaVkbXrO_9R37DJB'
+                     'AgdFv0owVONK3GbqPOEICePgG6RFtri999DetNE-O5sB4fwmHPWcHPlO'
+                     'kcPLbVJqu6zWo-2AzlfAy5bCNvj_wzs2tjFjLeHcRgR1a1WY3uTp5EWc'
+                     'HITCWQZzZWFGZTZCTlGkpdyJTqxGBdSHRB4NlIVGpYSTBsBsxttFEetl'
+                     'rpcNd4-5AteFprIr9hn9VasIIF8WdFdtC2e8xGMJW5Q0M3G3Iu-LLNmE'
+                     'oTIDqtbJ7OrIcGBIwsc3seCV3eCG6kOYwz5w-f8DeOpwcDX58yYPmapJ'
+                     '6A'),
+    'expires_in': 600,
+    'id_token': ('eyJhbGciOiJSUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJPSnhVQ0p0'
+                 'TmJQT0NOUGFNNmc3ZU1zY2pqTXhoem9vNGxZaFhsa1c2TWhBIn0.eyJqdGki'
+                 'OiI0NDRlYzU1My1iYzhiLTQ2YjYtOTlmYS0zOTc3YTJhZDY1ZmEiLCJleHAi'
+                 'OjE1ODI3MjM3MDEsIm5iZiI6MCwiaWF0IjoxNTgyNzIzMTAxLCJpc3MiOiJo'
+                 'dHRwOi8vbG9jYWxob3N0OjgwODAvYXV0aC9yZWFsbXMvU29mdHdhcmVIZXJp'
+                 'dGFnZSIsImF1ZCI6InN3aC13ZWIiLCJzdWIiOiJmZWFjZDM0NC1iNDY4LTRh'
+                 'NjUtYTIzNi0xNGY2MWU2YjcyMDAiLCJ0eXAiOiJJRCIsImF6cCI6InN3aC13'
+                 'ZWIiLCJhdXRoX3RpbWUiOjE1ODI3MjMxMDAsInNlc3Npb25fc3RhdGUiOiJk'
+                 'ODJiOTBkMS0wYTk0LTRlNzQtYWQ2Ni1kZDk1MzQxYzdiNmQiLCJhY3IiOiIx'
+                 'IiwiZW1haWxfdmVyaWZpZWQiOmZhbHNlLCJuYW1lIjoiSm9obiBEb2UiLCJn'
+                 'cm91cHMiOltdLCJwcmVmZXJyZWRfdXNlcm5hbWUiOiJqb2huZG9lIiwiZ2l2'
+                 'ZW5fbmFtZSI6IkpvaG4iLCJmYW1pbHlfbmFtZSI6IkRvZSIsImVtYWlsIjoi'
+                 'am9obi5kb2VAZXhhbXBsZS5jb20ifQ.YB7bxlz_wgLJSkylVjmqedxQgEMee'
+                 'JOdi9CFHXV4F3ZWsEZ52CGuJXsozkX2oXvgU06MzzLNEK8ojgrPSNzjRkutL'
+                 'aaLq_YUzv4iV8fmKUS_aEyiYZbfoBe3Y4dwv2FoPEPCt96iTwpzM5fg_oYw_'
+                 'PHCq-Yl5SulT1nTrJZpntkf0hRjmxlDO06JMp0aZ8xS8RYJqH48xCRf_DARE'
+                 '0jJV2-UuzOWI6xBATwFfP44kV6wFmErLN5txMgwZzCSB2OCe5Cl1il0eTQTN'
+                 'ybeSYZeZE61QtuTRUHeP1D1qSbJGy5g_S67SdTkS-hQFvfrrD84qGflIEqnX'
+                 'ZbYnitD1Typ6Q'),
+    'not-before-policy': 0,
+    'refresh_expires_in': 1800,
+    'refresh_token': ('eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJmNjM'
+                      'zMDE5MS01YTU4LTQxMDAtOGIzYS00ZDdlM2U1NjA3MTgifQ.eyJqdGk'
+                      'iOiIxYWI5ZWZmMS0xZWZlLTQ3MDMtOGQ2YS03Nzg1NWUwYzQyYTYiLC'
+                      'JleHAiOjE1ODI3MjQ5MDEsIm5iZiI6MCwiaWF0IjoxNTgyNzIzMTAxL'
+                      'CJpc3MiOiJodHRwOi8vbG9jYWxob3N0OjgwODAvYXV0aC9yZWFsbXMv'
+                      'U29mdHdhcmVIZXJpdGFnZSIsImF1ZCI6Imh0dHA6Ly9sb2NhbGhvc3Q'
+                      '6ODA4MC9hdXRoL3JlYWxtcy9Tb2Z0d2FyZUhlcml0YWdlIiwic3ViIj'
+                      'oiZmVhY2QzNDQtYjQ2OC00YTY1LWEyMzYtMTRmNjFlNmI3MjAwIiwid'
+                      'HlwIjoiUmVmcmVzaCIsImF6cCI6InN3aC13ZWIiLCJhdXRoX3RpbWUi'
+                      'OjAsInNlc3Npb25fc3RhdGUiOiJkODJiOTBkMS0wYTk0LTRlNzQtYWQ'
+                      '2Ni1kZDk1MzQxYzdiNmQiLCJyZWFsbV9hY2Nlc3MiOnsicm9sZXMiOl'
+                      'sib2ZmbGluZV9hY2Nlc3MiLCJ1bWFfYXV0aG9yaXphdGlvbiJdfSwic'
+                      'mVzb3VyY2VfYWNjZXNzIjp7ImFjY291bnQiOnsicm9sZXMiOlsibWFu'
+                      'YWdlLWFjY291bnQiLCJtYW5hZ2UtYWNjb3VudC1saW5rcyIsInZpZXc'
+                      'tcHJvZmlsZSJdfX0sInNjb3BlIjoib3BlbmlkIGVtYWlsIHByb2ZpbG'
+                      'UifQ.xQYrl2CMP_GQ_TFqhsTz-rTs3WuZz5I37toi1eSsDMI'),
+    'scope': 'openid email profile',
+    'session_state': 'd82b90d1-0a94-4e74-ad66-dd95341c7b6d',
+    'token_type': 'bearer'
+}
+
+userinfo = {
+    'email': 'john.doe@example.com',
+    'email_verified': False,
+    'family_name': 'Doe',
+    'given_name': 'John',
+    'groups': ['/staff'],
+    'name': 'John Doe',
+    'preferred_username': 'johndoe',
+    'sub': 'feacd344-b468-4a65-a236-14f61e6b7200'
+}
diff --git a/swh/web/tests/auth/test_backends.py b/swh/web/tests/auth/test_backends.py
new file mode 100644
--- /dev/null
+++ b/swh/web/tests/auth/test_backends.py
@@ -0,0 +1,81 @@
+# Copyright (C) 2020  The Software Heritage developers
+# See the AUTHORS file at the top-level directory of this distribution
+# License: GNU Affero General Public License version 3, or any later version
+# See top-level LICENSE file for more information
+
+from datetime import datetime, timedelta
+
+from django.contrib.auth import authenticate, get_backends
+
+import pytest
+
+from django.conf import settings
+
+from swh.web.auth.models import OIDCUser
+from swh.web.common.utils import reverse
+
+from . import sample_data
+from .keycloak_mock import mock_keycloak
+
+
+def _authenticate_user(request_factory):
+    request = request_factory.get(reverse('oidc-login-complete'))
+
+    return authenticate(request=request,
+                        code='some-code',
+                        code_verifier='some-code-verifier',
+                        redirect_uri='https://localhost:5004')
+
+
+def _check_authenticated_user(user):
+    userinfo = sample_data.userinfo
+    assert user is not None
+    assert isinstance(user, OIDCUser)
+    assert user.id != 0
+    assert user.username == userinfo['preferred_username']
+    assert user.password == ''
+    assert user.first_name == userinfo['given_name']
+    assert user.last_name == userinfo['family_name']
+    assert user.email == userinfo['email']
+    assert user.is_staff == ('/staff' in userinfo['groups'])
+    assert user.sub == userinfo['sub']
+
+
+@pytest.mark.django_db
+def test_oidc_code_pkce_auth_backend_success(mocker, request_factory):
+    kc_oidc_mock = mock_keycloak(mocker)
+    oidc_profile = sample_data.oidc_profile
+    user = _authenticate_user(request_factory)
+
+    _check_authenticated_user(user)
+
+    decoded_token = kc_oidc_mock.decode_token(
+        sample_data.oidc_profile['access_token'])
+    auth_datetime = datetime.fromtimestamp(decoded_token['auth_time'])
+
+    access_expiration = (
+        auth_datetime + timedelta(seconds=oidc_profile['expires_in']))
+    refresh_expiration = (
+        auth_datetime + timedelta(seconds=oidc_profile['refresh_expires_in']))
+
+    assert user.access_token == oidc_profile['access_token']
+    assert user.access_expiration == access_expiration
+    assert user.id_token == oidc_profile['id_token']
+    assert user.refresh_token == oidc_profile['refresh_token']
+    assert user.refresh_expiration == refresh_expiration
+    assert user.scope == oidc_profile['scope']
+    assert user.session_state == oidc_profile['session_state']
+
+    backend_path = 'swh.web.auth.backends.OIDCAuthorizationCodePKCEBackend'
+    assert user.backend == backend_path
+    backend_idx = settings.AUTHENTICATION_BACKENDS.index(backend_path)
+    assert get_backends()[backend_idx].get_user(user.id) == user
+
+
+@pytest.mark.django_db
+def test_oidc_code_pkce_auth_backend_failure(mocker, request_factory):
+    mock_keycloak(mocker, auth_success=False)
+
+    user = _authenticate_user(request_factory)
+
+    assert user is None
diff --git a/swh/web/tests/auth/test_utils.py b/swh/web/tests/auth/test_utils.py
new file mode 100644
--- /dev/null
+++ b/swh/web/tests/auth/test_utils.py
@@ -0,0 +1,37 @@
+# Copyright (C) 2020  The Software Heritage developers
+# See the AUTHORS file at the top-level directory of this distribution
+# License: GNU Affero General Public License version 3, or any later version
+# See top-level LICENSE file for more information
+
+import hashlib
+import re
+
+from base64 import urlsafe_b64encode
+
+from swh.web.auth.utils import gen_oidc_pkce_codes
+
+
+def test_gen_oidc_pkce_codes():
+    """
+    Check generated PKCE codes respect the specification
+    (see https://tools.ietf.org/html/rfc7636#section-4.1)
+    """
+    code_verifier, code_challenge = gen_oidc_pkce_codes()
+
+    # check the code verifier only contains allowed characters
+    assert re.match(r'[a-zA-Z0-9-\._~]+', code_verifier)
+
+    # check minimum and maximum authorized length for the
+    # code verifier
+    assert len(code_verifier) >= 43
+    assert len(code_verifier) <= 128
+
+    # compute code challenge from code verifier
+    challenge = hashlib.sha256(code_verifier.encode('ascii')).digest()
+    challenge = urlsafe_b64encode(challenge).decode('ascii')
+    challenge = challenge.replace('=', '')
+
+    # check base64 padding is not present
+    assert not code_challenge[-1].endswith('=')
+    # check code challenge is valid
+    assert code_challenge == challenge
diff --git a/swh/web/tests/auth/test_views.py b/swh/web/tests/auth/test_views.py
new file mode 100644
--- /dev/null
+++ b/swh/web/tests/auth/test_views.py
@@ -0,0 +1,275 @@
+# Copyright (C) 2020  The Software Heritage developers
+# See the AUTHORS file at the top-level directory of this distribution
+# License: GNU Affero General Public License version 3, or any later version
+# See top-level LICENSE file for more information
+
+from urllib.parse import urljoin, urlparse
+import uuid
+
+from django.conf import settings
+from django.http import QueryDict
+from django.contrib.auth.models import AnonymousUser, User
+
+import pytest
+
+from swh.web.auth.models import OIDCUser
+from swh.web.common.utils import reverse
+from swh.web.tests.django_asserts import assert_template_used, assert_contains
+
+from . import sample_data
+from .keycloak_mock import mock_keycloak
+
+
+@pytest.mark.django_db
+def test_oidc_login_views_success(client, mocker):
+    """
+    Simulate a successful login authentication with OpenID Connect
+    authorization code flow with PKCE.
+    """
+    # mock Keycloak client
+    kc_oidc_mock = mock_keycloak(mocker)
+
+    # user initiates login process
+    login_url = reverse('oidc-login')
+    response = client.get(login_url)
+    request = response.wsgi_request
+
+    # should redirect to Keycloak authentication page in order
+    # for a user to login with its username / password
+    assert response.status_code == 302
+    assert isinstance(request.user, AnonymousUser)
+
+    parsed_url = urlparse(response['location'])
+
+    authorization_url = kc_oidc_mock.well_known()['authorization_endpoint']
+    query_dict = QueryDict(parsed_url.query)
+
+    # check redirect url is valid
+    assert urljoin(response['location'], parsed_url.path) == authorization_url
+    assert 'client_id' in query_dict
+    assert query_dict['client_id'] == settings.OIDC_SWH_WEB_CLIENT_ID
+    assert 'response_type' in query_dict
+    assert query_dict['response_type'] == 'code'
+    assert 'redirect_uri' in query_dict
+    assert query_dict['redirect_uri'] == reverse('oidc-login-complete',
+                                                 request=request)
+    assert 'code_challenge_method' in query_dict
+    assert query_dict['code_challenge_method'] == 'S256'
+    assert 'scope' in query_dict
+    assert query_dict['scope'] == 'openid'
+    assert 'state' in query_dict
+    assert 'code_challenge' in query_dict
+
+    # check a login_data has been registered in user session
+    assert 'login_data' in request.session
+    login_data = request.session['login_data']
+    assert 'code_verifier' in login_data
+    assert 'state' in login_data
+    assert 'redirect_uri' in login_data
+    assert login_data['redirect_uri'] == query_dict['redirect_uri']
+
+    # once a user has identified himself in Keycloak, he is
+    # redirected to the 'oidc-login-complete' view to
+    # login in Django.
+
+    # generate authorization code / session state in the same
+    # manner as Keycloak
+    code = f'{str(uuid.uuid4())}.{str(uuid.uuid4())}.{str(uuid.uuid4())}'
+    session_state = str(uuid.uuid4())
+
+    login_complete_url = reverse('oidc-login-complete',
+                                 query_params={'code': code,
+                                               'state': login_data['state'],
+                                               'session_state': session_state})
+
+    # login process finalization
+    response = client.get(login_complete_url)
+    request = response.wsgi_request
+
+    # should redirect to root url by default
+    assert response.status_code == 302
+    assert response['location'] == request.build_absolute_uri('/')
+
+    # user should be authenticated
+    assert isinstance(request.user, OIDCUser)
+
+    # check remote user has not been saved to Django database
+    with pytest.raises(User.DoesNotExist):
+        User.objects.get(username=request.user.username)
+
+
+@pytest.mark.django_db
+def test_oidc_logout_view_success(client, mocker):
+    """
+    Simulate a successful logout operation with OpenID Connect.
+    """
+    # mock Keycloak client
+    kc_oidc_mock = mock_keycloak(mocker)
+    # login our test user
+    client.login(code='', code_verifier='', redirect_uri='')
+    kc_oidc_mock.authorization_code.assert_called()
+
+    # user initiates logout
+    oidc_logout_url = reverse('oidc-logout')
+    response = client.get(oidc_logout_url)
+    request = response.wsgi_request
+
+    # should redirect to logout page
+    assert response.status_code == 302
+    logout_url = reverse('logout', query_params={'remote_user': 1})
+    assert response['location'] == request.build_absolute_uri(logout_url)
+
+    # should have been logged out in Keycloak
+    kc_oidc_mock.logout.assert_called_with(
+        sample_data.oidc_profile['refresh_token'])
+
+    # check effective logout in Django
+    assert isinstance(request.user, AnonymousUser)
+
+
+@pytest.mark.django_db
+def test_oidc_login_view_failure(client, mocker):
+    """
+    Simulate a failed authentication with OpenID Connect.
+    """
+    # mock Keycloak client
+    mock_keycloak(mocker, auth_success=False)
+
+    # user initiates login process
+    login_url = reverse('oidc-login')
+    response = client.get(login_url)
+    request = response.wsgi_request
+
+    # should render an error page
+    assert response.status_code == 500
+    assert_template_used(response, "error.html")
+
+    # no users should be logged in
+    assert isinstance(request.user, AnonymousUser)
+
+
+# Simulate possible errors with OpenID Connect in the login complete view.
+
+def test_oidc_login_complete_view_no_login_data(client, mocker):
+    # user initiates login process
+    login_url = reverse('oidc-login-complete')
+    response = client.get(login_url)
+
+    # should render an error page
+    assert_template_used(response, "error.html")
+    assert_contains(response, 'Login process has not been initialized.',
+                    status_code=500)
+
+
+def test_oidc_login_complete_view_missing_parameters(client, mocker):
+    # simulate login process has been initialized
+    session = client.session
+    session['login_data'] = {
+        'code_verifier': '',
+        'state': str(uuid.uuid4()),
+        'redirect_uri': '',
+        'next': None,
+    }
+    session.save()
+
+    # user initiates login process
+    login_url = reverse('oidc-login-complete')
+    response = client.get(login_url)
+    request = response.wsgi_request
+
+    # should render an error page
+    assert_template_used(response, "error.html")
+    assert_contains(response, 'Missing query parameters for authentication.',
+                    status_code=400)
+
+    # no user should be logged in
+    assert isinstance(request.user, AnonymousUser)
+
+
+def test_oidc_login_complete_wrong_csrf_token(client, mocker):
+    # mock Keycloak client
+    mock_keycloak(mocker)
+
+    # simulate login process has been initialized
+    session = client.session
+    session['login_data'] = {
+        'code_verifier': '',
+        'state': str(uuid.uuid4()),
+        'redirect_uri': '',
+        'next': None,
+    }
+    session.save()
+
+    # user initiates login process
+    login_url = reverse('oidc-login-complete',
+                        query_params={'code': 'some-code',
+                                      'state': 'some-state'})
+
+    response = client.get(login_url)
+    request = response.wsgi_request
+
+    # should render an error page
+    assert_template_used(response, "error.html")
+    assert_contains(response, 'Wrong CSRF token, aborting login process.',
+                    status_code=400)
+
+    # no user should be logged in
+    assert isinstance(request.user, AnonymousUser)
+
+
+@pytest.mark.django_db
+def test_oidc_login_complete_wrong_code_verifier(client, mocker):
+    # mock Keycloak client
+    mock_keycloak(mocker, auth_success=False)
+
+    # simulate login process has been initialized
+    session = client.session
+    session['login_data'] = {
+        'code_verifier': '',
+        'state': str(uuid.uuid4()),
+        'redirect_uri': '',
+        'next': None,
+    }
+    session.save()
+
+    # check authentication error is reported
+    login_url = reverse('oidc-login-complete',
+                        query_params={'code': 'some-code',
+                                      'state': session['login_data']['state']})
+
+    response = client.get(login_url)
+    request = response.wsgi_request
+
+    # should render an error page
+    assert_template_used(response, "error.html")
+    assert_contains(response, 'User authentication failed.',
+                    status_code=500)
+
+    # no user should be logged in
+    assert isinstance(request.user, AnonymousUser)
+
+
+@pytest.mark.django_db
+def test_oidc_logout_view_failure(client, mocker):
+    """
+    Simulate a failed logout operation with OpenID Connect.
+    """
+    # mock Keycloak client
+    kc_oidc_mock = mock_keycloak(mocker)
+    # login our test user
+    client.login(code='', code_verifier='', redirect_uri='')
+
+    err_msg = 'Authentication server error'
+    kc_oidc_mock.logout.side_effect = Exception(err_msg)
+
+    # user initiates logout process
+    logout_url = reverse('oidc-logout')
+    response = client.get(logout_url)
+    request = response.wsgi_request
+
+    # should render an error page
+    assert_template_used(response, "error.html")
+    assert_contains(response, err_msg, status_code=500)
+
+    # user should be logged out from Django anyway
+    assert isinstance(request.user, AnonymousUser)
diff --git a/swh/web/urls.py b/swh/web/urls.py
--- a/swh/web/urls.py
+++ b/swh/web/urls.py
@@ -1,4 +1,4 @@
-# Copyright (C) 2017-2019  The Software Heritage developers
+# Copyright (C) 2017-2020  The Software Heritage developers
 # See the AUTHORS file at the top-level directory of this distribution
 # License: GNU Affero General Public License version 3, or any later version
 # See top-level LICENSE file for more information
@@ -8,7 +8,9 @@
 from django.conf.urls import (
     url, include, handler400, handler403, handler404, handler500
 )
+from django.contrib.auth.views import LogoutView
 from django.contrib.staticfiles.views import serve
+
 from django.shortcuts import render
 from django.views.generic.base import RedirectView
 
@@ -40,6 +42,10 @@
     url(r'^(?P<swh_id>swh:[0-9]+:[a-z]+:[0-9a-f]+.*)/$',
         swh_id_browse, name='browse-swh-id'),
     url(r'^', include('swh.web.misc.urls')),
+    url(r'^', include('swh.web.auth.views')),
+    url(r'^logout/$',
+        LogoutView.as_view(template_name='logout.html'),
+        name='logout'),
 ]