Configuring the identity provider for an OpenID Connect SSO authentication service
To enable the system to verify the identity of requestors, configure the identity provider for your OpenID SSO authentication service. You configure the identity provider by importing values from a file or by entering them manually.
- Open the service from the navigation panel in Dev Studio by clicking and choosing a service from the instance list.
- On the OpenID Connect tab, navigate to the OpenID Connect provider configuration section.
- If you are configuring the identity provider by importing the configuration, complete
these steps:
- Click Import metadata.
- Select the source of the metadata ( via URL or
via file ), and then enter the URL or file path. URL is in the format:
https://
<domain name>/.well-known/openid-configuration
- Click Submit.
- If you are configuring the identity provider by entering values manually, complete
these steps:
- In the Authorization endpoint field, enter the authorization endpoint URL.
- In the Token endpoint field, enter the token endpoint URL.
- Optional: In the Userinfo endpoint field, enter the userinfo endpoint URL.
- Optional: In the Logout endpoint field, enter the logout endpoint URL.
- In the Redirect URI field, enter the redirect URI.
- In the Issuer field, enter the certificate issuer.
- In the Signature truststore field, press the Down Arrow key and select the keystore that contains the public key that is used for verifying the signature of the authentication assertion.
- To add parameters for any of these fields, click Add parameters.
- Navigate to the Client information section and complete the Client identifier, Client secret, and Scope fields.
- In the Operator identification section, in the Map operator id from claim field, specify the name of the claim that contains the operator ID. Enclose the attribute name in curly braces, for example, {name}.
- Optional: Configure the advanced properties of the identity provider.
- Click Save.
Previous topic Configuring SSO login authentication with an OpenID Connect identity provider Next topic Configuring advanced features for an OpenID Connect SSO authentication service