OIDC Management
The platform supports the OIDC (OpenID Connect) protocol, enabling platform administrators to log in using third-party accounts after adding OIDC configuration. Platform administrators can also update and delete configured OIDC services.
TOC
Overview of OIDC
OIDC (OpenID Connect) is an identity authentication standard protocol based on the OAuth 2.0 protocol. It uses an OAuth 2.0 authorization server to provide user identity authentication for third-party clients and passes the corresponding identity authentication information to the client.
OIDC allows all types of clients (including server-side, mobile, and JavaScript clients) to request and receive authenticated sessions and end-user information. This specification suite is extensible, allowing participants to use optional features such as identity data encryption, OpenID Provider discovery, and session management when meaningful. For more information, refer to the OIDC official documentation.
Adding OIDC
By adding OIDC, you can use third-party platform accounts to log in to the platform.
Note: After OIDC users successfully log in to the platform, the platform will use the user's email attribute as the unique identifier. OIDC-supported third-party platform users must have an email attribute; otherwise, they will not be able to log in to the platform.
Procedure of Operation
-
In the left navigation bar, click Users > IDPs.
-
Click Add OIDC.
-
Configure the Basic Information parameters.
-
Configure the OIDC Server Configuration parameters:
-
Identity Provider URL: The issuer URL, which is the access address of the OIDC identity provider.
-
Client ID: The client identifier for the OIDC client.
-
Client Secret: The secret key for the OIDC client.
-
Redirect URI: The callback address after logging in to the third-party platform, which is the URL of the dex issuer +
/callback. -
Logout URL: The address visited by the user after performing the Logout operation. If empty, the logout address will be the platform's initial login page.
-
-
In the IDP Service Configuration Validation area, enter the Username and Password of a valid OIDC account to verify the configuration.
Tip: If the username and password are incorrect, an error will be reported during addition, indicating invalid credentials, and OIDC cannot be added.
-
Click Create.
Adding OIDC via YAML
In addition to form configuration, the platform also supports adding OIDC through YAML, which allows for more flexible configuration of authentication parameters, claim mappings, user group synchronization, and other advanced features.
Example: Configuring OIDC Connector
The following example demonstrates how to configure an OIDC connector for integrating with OIDC identity authentication services. This configuration example is suitable for the following scenarios:
-
Need to integrate OIDC as an identity authentication server.
-
Need to support user group information synchronization.
-
Need to customize logout redirect address.
-
Need to configure specific OIDC scopes.
-
Need to customize claim mappings.
Relevant Operations
You can click the
on the right in the list page or click Actions in the upper-right corner on the details page to update or delete OIDC as needed.