keycloak-scim/topics/identity-broker/oidc.adoc

57 lines
2.7 KiB
Text
Raw Normal View History

2016-05-27 15:23:34 +00:00
2016-05-26 16:09:04 +00:00
=== OpenID Connect v1.0 Identity Providers
2016-05-27 15:23:34 +00:00
{{book.project.name}} can broker identity providers based on the OpenID Connect protocol. These IDPs must support the <<fake/../../sso-protocols/oidc.adoc, Authorization Code Flow>>
as defined by the specification in order to authenticate the user and authorize access.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
To begin configuring an OIDC provider, go to the `Identity Providers` left menu item
and selected `OpenID Connect v1.0` from the `Add provider` drop down list. This will bring you to the `Add identity provider` page.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
.Add Identity Provider
image:../../../{{book.images}}/oidc-add-identity-provider.png[]
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
The initial configuration options on this page are described in <<fake/../../identity-broker/configuration.adoc#_general-idp-config, General IDP Configuration>>.
You must define the OpenID Connection configuration options as well. They basically describe the OIDC IDP you are communicating with.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
.OpenID Connect Config
2016-05-26 16:09:04 +00:00
|===
2016-05-27 15:23:34 +00:00
|Configuration|Description
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|Authorization URL
|Authorization URL endpoint required by the OIDC protocol
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|Token URL
|Token URL endpoint required by the OIDC protocol
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|Logout URL
|Logout URL endpoint defined in the OIDC protocol. This value is optional.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|Backchannel Logout
|Backchannel logout is a background, out-of-band, REST invocation to the IDP to logout the user. Some IDPs can only perform logout through browser redirects as they may
only be able to identity sessions via a browser cookie.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|User Info URL
|User Info URL endpoint defined by the OIDC protocol. This is an endpoint from which user profile information can be downloaded.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|Client ID
|This realm will act as an OIDC client to the external federation IDP you are configuring here. Your realm will need a OIDC client ID when using the Authorization Code Flow
to interact with the external IDP
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|Client Secret
|This realm will need a client secret to use when using the Authorization Code Flow.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|Issuer
|Responses from the IDP may contain an issuer claim. This config value is optional. If specified, this claim will be validated against the value you provide.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|Default Scopes
|Space-separated list of OIDC scopes to send with the authentication request. The default is `openid`
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|Prompt
|Another optional switch. This is the prompt parameter defined by the OIDC specification. Through it you can force re-authentication and other options. See the specification for
more details
2016-05-26 16:09:04 +00:00
|===
2016-05-27 15:23:34 +00:00
You can also import all this configuration data by providing a URL or file that points to OpenID Provider Metadata (see OIDC Discovery specification).
If you are connecting to a {{book.project.name}} external IDP, you can import the IDP setttings from the url `<root>/auth/realms/\{realm-name}/.well-known/openid-configuration`.
This link is a JSON document describing metadata about the IDP.