keycloak-scim/server_admin/topics/identity-broker/oidc.adoc

104 lines
7.1 KiB
Text
Raw Normal View History

2019-09-06 13:43:32 +00:00
[[_identity_broker_oidc]]
2016-05-26 16:09:04 +00:00
=== OpenID Connect v1.0 Identity Providers
{project_name} can broker identity providers based on the OpenID Connect protocol. These IDPs must support the xref:proc-creating-oidc-client_{context}[Authorization Code Flow]
2016-05-27 15:23:34 +00:00
as defined by the specification in order to authenticate the user and authorize access.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
To begin configuring an OIDC provider, go to the `Identity Providers` left menu item
and select `OpenID Connect v1.0` from the `Add provider` drop down list. This will bring you to the `Add identity provider` page.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
.Add Identity Provider
2017-08-28 12:50:14 +00:00
image:{project_images}/oidc-add-identity-provider.png[]
2016-05-26 16:09:04 +00:00
2017-08-28 12:50:14 +00:00
The initial configuration options on this page are described in <<_general-idp-config, General IDP Configuration>>.
2018-01-25 08:35:22 +00:00
You must define the OpenID Connect configuration options as well. They basically describe the OIDC IDP you are communicating with.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
.OpenID Connect Config
2016-05-26 16:09:04 +00:00
|===
2016-05-27 15:23:34 +00:00
|Configuration|Description
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|Authorization URL
|Authorization URL endpoint required by the OIDC protocol.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|Token URL
|Token URL endpoint required by the OIDC protocol.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|Logout URL
|Logout URL endpoint defined in the OIDC protocol. This value is optional.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|Backchannel Logout
|Backchannel logout is a background, out-of-band, REST invocation to the IDP to logout the user. Some IDPs can only perform logout through browser redirects as they may
only be able to identity sessions via a browser cookie.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|User Info URL
|User Info URL endpoint defined by the OIDC protocol. This is an endpoint from which user profile information can be downloaded.
2016-05-26 16:09:04 +00:00
|Client Authentication
|Switch to define the Client Authentication method to be used with the Authorization Code Flow. In the case of JWT signed with private key, the realm private key
is used. In the other cases, a client secret has to be defined.
For more details, see the https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication[Client Authentication specifications].
2016-05-27 15:23:34 +00:00
|Client ID
|This realm will act as an OIDC client to the external IDP. Your realm will need an OIDC client ID when using the Authorization Code Flow
to interact with the external IDP.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|Client Secret
2019-09-06 13:43:32 +00:00
|This realm will need a client secret to use when using the Authorization Code Flow. The value of this field can refer a value from an external <<_vault-administration,vault>>.
2016-05-26 16:09:04 +00:00
|Client Assertion Signature Algorithm
|Signature algorithm to create JWT assertion as client authentication.
In the case of JWT signed with private key or Client secret as jwt, it is required. If no algorithm is specified, the following algorithm is adapted. `RS256` is adapted in the case of JWT signed with private key. `HS256` is adapted in the case of Client secret as jwt.
2016-05-27 15:23:34 +00:00
|Issuer
|Responses from the IDP may contain an issuer claim. This config value is optional. If specified, this claim will be validated against the value you provide.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|Default Scopes
|Space-separated list of OIDC scopes to send with the authentication request. The default is `openid`.
2016-05-26 16:09:04 +00:00
2016-05-27 15:23:34 +00:00
|Prompt
|Another optional switch. This is the prompt parameter defined by the OIDC specification. Through it you can force re-authentication and other options. See the specification for
more details.
|Accepts prompt=none forward from client
|Specifies whether the IDP accepts forwarded authentication requests that contain the prompt=none query parameter or not. When a realm receives an auth request with `prompt=none` it checks
if the user is currently authenticated and normally returns a `login_required` error if the user is not logged in. However, when a default IDP can be determined
for the auth request (either via `kc_idp_hint` query param or by setting up a default IDP for the realm) we should be able to forward the auth request with
`prompt=none` to the default IDP so that it checks if the user is currently authenticated there. Because not all IDPs support requests with `prompt=none` this switch
is used to indicate if the default IDP supports the param before redirecting the auth request.
It is important to note that if the user is not authenticated in the IDP, the client will still get a `login_required` error. Even if the user is currently authenticated in the IDP,
the client might still get an `interaction_required` error if authentication or consent pages requiring user interaction would be otherwise displayed. This includes required actions
(e.g. change password), consent screens and any screens set to be displayed by the `first broker login` flow or `post broker login` flow.
|Validate Signatures
|Another optional switch. This is to specify if {project_name} will verify the signatures on the external ID Token signed by this identity provider. If this is on,
the {project_name} will need to know the public key of the external OIDC identity provider. See below for how to set it up.
WARNING: For the performance purposes, {project_name} caches the public key of the external OIDC identity provider. If you think that private key of your identity provider
2016-11-25 21:18:52 +00:00
was compromised, it is obviously good to update your keys, but it's also good to clear the keys cache. See
2017-08-28 12:50:14 +00:00
<<_clear-cache, Clearing the cache>> section for more details.
|Use JWKS URL
|Applicable if `Validate Signatures` is on. If the switch is on, then identity provider public keys will be downloaded from given JWKS URL.
This allows great flexibility because new keys will be always re-downloaded when the identity provider generates new keypair. If the switch is off,
then public key (or certificate) from the {project_name} DB is used, so whenever the identity provider keypair changes, you will always need to import the new key to the {project_name} DB as well.
|JWKS URL
|URL where the identity provider JWK keys are stored. See the https://self-issued.info/docs/draft-ietf-jose-json-web-key.html[JWK specification] for more details.
If you use an external {project_name} as an identity provider, then you can use URL like http://broker-keycloak:8180/auth/realms/test/protocol/openid-connect/certs assuming your brokered
{project_name} is running on http://broker-keycloak:8180 and it's realm is `test`.
|Validating Public Key
|Applicable if `Use JWKS URL` is off. Here is the public key in PEM format that must be used to verify external IDP signatures.
|Validating Public Key Id
|Applicable if `Use JWKS URL` is off. This field specifies ID of the public key in PEM format. This config value is optional. As there is no standard way
2017-08-28 12:50:14 +00:00
for computing key ID from key, various external identity providers might use different algorithm from {project_name}. If the value of this field
is not specified, the validating public key specified above is used for all requests regardless of key ID sent by external IDP. When set, value of this
2017-08-28 12:50:14 +00:00
field serves as key ID used by {project_name} for validating signatures from such providers and must match the key ID specified by the IDP.
2016-05-26 16:09:04 +00:00
|===
2016-05-27 15:23:34 +00:00
You can also import all this configuration data by providing a URL or file that points to OpenID Provider Metadata (see OIDC Discovery specification).
2018-01-25 08:35:22 +00:00
If you are connecting to a {project_name} external IDP, you can import the IDP settings from the url `<root>/auth/realms/{realm-name}/.well-known/openid-configuration`.
2016-05-27 15:23:34 +00:00
This link is a JSON document describing metadata about the IDP.