Authorization Code Flow
Authenticator handling authorization code flows in OIDC.
About
No identification is done by this authenticator. It acts as a controller for issuing Json Web Tokens (JWT). Typically this authenticator is the first point of contact coming from an OpenID Connect Relying Party, requesting identification.
This authenticaton controller can be considered a start and end touch point. The main purpose is to handle OpenID Connect specifics.
Actual user identification is done elsewhere.
When using this authenticator, the ID token is fetched from the token endpoint.
Configuration
Authenticator Type: OIDCAuthCodeFlow
Common Authenticator configuration can be found here.
Name | Description | Default value | Mandatory |
---|---|---|---|
| List of authenticators performing the actual authentication. | N/A | |
| Time to live in milliseconds for the generated code. Previous parameter name |
| |
| Access token time to live in millisesonds. Previous parameter name |
| |
| Enables the use of refresh tokens. |
| |
| Refresh token time to live in millisesonds. |
| |
| ID token time to live in minutes. |
| |
| ID token headers. Previous parameter name | N/A | |
| ID token claims. Previous parameter name | N/A | |
| Access Token headers. ONLY used when sending access tokens as JWTs. | N/A | |
| Access Token claims. Previous parameter name | N/A | |
| Enables access tokens as JWT. |
| |
| Access Token time to live in minutes. |
| |
| Keystore reference or json object containing key store configuration. Used for JWT signing. | N/A | |
| Keystore password | N/A | |
| Keystore alias | N/A | |
| N/A | ||
| Required parameters. |
| |
| If the prompt request parameter is missing and a user session exists, the user is silently authenticated. Enables the same behaviour as if prompt=none and a user session exists. |
|
NOTE: id- & access-token claims can be configured globally on the authenticator OR for each relying party. Claims configured on the relying party trumps the global values.
Relying party Configuration
Name | Description | Default value | Mandatory |
---|---|---|---|
| Used for identifying and authenticating the client. | N/A | |
| Used for identifying and authenticating the client. | N/A | |
| Redirect location where the authorization code or JWT should be sent. | N/A | |
| Redirect location after logout. | N/A | |
| Pipe reference. Pipe is run directly after user authentication. Used for collecting data for claims. | N/A | |
| ID token headers configured per RP. Previous parameter name | N/A | |
| ID token claims configured per RP. Previous parameter name | N/A | |
| Access Token headers configured per RP. ONLY used when sending access tokens as JWTs. | N/A | |
| Access Token claims configured per RP. Previous parameter name | N/A |
Logging
On a successful authentication, an event is logged containing the following:
WEB_100101
IDENTIFIER (user traceid)
DESTINATION_SERVICE_NAME (redirect URI)
SOURCE_ADDRESS (user IP address)
Data sent to PIPE
All data put into the shared authentication state along with the HTTP headers are exposed and sent into the pipe.
Data put into the state by this authenticator is:
OIDC request data
Expected data from PIPE
In order to use data from PIPE the response must contain one item. All data from that item will be available when creating the ID token and access token.
Available data for ID_token and Access Token claims
Data is extracted with the help of expansions.
The following scopes are available:
Scope | Description | Example |
---|---|---|
| The current authentication request including HTTP |
|
| Item properties AND the current authentication state (includes both local and global properties). |
|
| The current session. |
|
Last updated