LogoLogo
HomeIntegrityControlSolutionsManagement Center
3.1.0 - Access
3.1.0 - Access
  • Introduction
  • The Service
    • Overview
    • About this release
      • Release notes
      • Breaking changes
    • Architecture
      • Modules
      • Folder structure
      • Startup
    • Getting started
    • Installation
      • Container
      • Linux
      • Windows
    • Operations
      • Configuration
      • Metrics
      • Health check
      • Logging
        • System logging
        • Event logging
      • SBOM & license material
  • Modules
    • External modules
    • Internal modules
      • SAMLModule
      • OIDC
        • OpenID Configuration endpoint
        • JWKS endpoint
        • Authorization endpoint
        • Token endpoint
          • Authorization code
          • Refresh token
        • User info endpoint
        • Introspection endpoint
        • End session endpoint
  • Configuration reference
    • Introduction
    • Terms and abbreviations
    • Property expansion
    • File inclusion
    • Secrets management
    • Examples
  • Authenticators
    • Introduction
    • Common configuration
    • Web Authenticator API
    • Flow control
      • Selector
      • AuthController
      • SSO Authenticator
      • Chain
      • Impersonate
      • Impersonate With Search
    • Credential validators
      • SITHS eID
        • With QR or "app-switch"
      • BankID
        • On another device
        • On mobile device
      • Freja e-ID
        • With user input
        • With QR or "app-switch"
      • Mobile ID
        • With QR or "app-switch"
      • Header based
        • Certificate
      • Pointsharp Net iD Access server
        • On another device
        • On same device
      • Integrated windows login, IWA
      • User name & password
      • User lookup
      • OTP validator
      • Passkey validator
      • Exposed metrics
      • Test
        • Static SAML
        • No operation
    • Protocol managers
      • SAML
        • SAML IDP
        • SAML SP
        • IDP Discovery Service
      • OIDC
        • Authorization Code Flow
        • Implicit Flow
        • OIDC Relying Party
    • UI
Powered by GitBook
On this page
  • About
  • Configuration
  • Logging
  • Data exposed to global state
  1. Authenticators
  2. Protocol managers
  3. OIDC

OIDC Relying Party

PreviousImplicit FlowNextUI

About

This authenticator acts as an OpenID Connect Relying Party, communicating with an external OpenID Connect Provider (OP). Supports OpenID Connect Authorization Code Flow.

Configuration

Authenticator Type: OIDCRP | OIDCAuthCodeFlowRP

Common Authenticator configuration can be found .

Name
Description
Default value
Mandatory

discovery_metadata_url

URL to the external OP.

N/A

internal_http_destination

ID of the internal http client used to communicate with the external OP.

N/A

custom_identifier

Custom identifier to be set inte the event logging entry

N/A

client_id

Client id used when communicating with the OP.

N/A

client_secret

Client secret used when communicating with the OP token endpoint.

N/A

redirect_uri

Redirect URI used when communicating with the OP.

N/A

scope

OIDC scope used when communicating with the OP.

"openid"

enable_user_info_lookup

If userinfo endpoint should be contacted. (The userinfo endpoint must also be part of the discovery metadata)

true

jwt_subject_parameter

JWT parameter used as

subject/username.

"sub"

use_raw_claims

If the collected claims should be presented "raw" on the global state object. Otherwise the claims will be "stringified".

false

id_token_header_prefix

Prefix to use for the id_token header claims.

""

id_token_payload_prefix

Prefix to use for the id_token payload claims.

""

userinfo_prefix

Prefix to use for the userinfo claims.

""

disable_nonce

Disables sending nonce as part of the requests.

false

{
    "id": "oidc_rp",
    "type": "OIDCRP",
    "config": {
        "base_path": "/oidcrp/authn",
        "custom_identifier": "fortifiedid",
        "discovery_metadata_url": "https://192.168.50.228/oidc/mycompany/.well-known/openid-configuration",
        "internal_http_destination": "oidcrp_httpclient",
        "client_id": "my_client_id",
        "client_secret": "my_client_secret",
        "redirect_uri": "http://127.0.0.1:8080/oidcrp/authn/oidc_rp",
        "jwt_subject_parameter": "given_name"	
    }
}

Logging

On a successful authentication, an event is logged containing the following:

  • WEB_100021

  • IDENTIFIER (user traceid)

  • SOURCE_SERVICE_NAME (issuer from metadata)

  • SOURCE_USER_NAME (jwt_subject_parameter from any of the claims)

  • SOURCE_ADDRESS (user IP address)

  • CUSTOMER_IDENTIFIER (custom_identifier if configured)

Data exposed to global state

After successful validation, data stored in the global state are:

  • id_token header claims

  • id_token payload claims

  • userinfo claims

here