Data Governance Broker Documentation Index
Configuration Reference Home

OIDC External Identity Provider

Note: this component stores cluster-wide configuration data and is mirrored across all servers in the topology within the the same cluster.

Note: changes to cluster-wide configuration objects are immediately and automatically mirrored across all servers within the same cluster, so offline changes are not supported.

An OIDC External Identity Provider authenticates users and retrieves user claims using OpenID Connect.

Parent Component
Properties
dsconfig Usage

Parent Component

The OIDC External Identity Provider component inherits from the External Identity Provider

Properties

The properties supported by this managed object are as follows:


Basic Properties: Advanced Properties:
↓ description  None
↓ enabled
↓ icon-uri
↓ hostname-verification-method
↓ key-manager-provider
↓ trust-manager-provider
↓ client-id
↓ client-secret
↓ scope
↓ client-auth-method
↓ issuer
↓ authorization-endpoint
↓ token-endpoint
↓ userinfo-endpoint

Basic Properties

description

Description
A description for this External Identity Provider
Default Value
None
Allowed Values
A string
Multi-Valued
No
Required
No
Admin Action Required
None. Modification requires no further action

enabled

Description
Indicates whether the External Identity Provider is enabled.
Default Value
None
Allowed Values
true
false
Multi-Valued
No
Required
Yes
Admin Action Required
None. Modification requires no further action

icon-uri

Description
The icon URI for this External Identity Provider.
Default Value
None
Allowed Values
An absolute URL with one of the following schemes: { http, https }, or a relative URL
Multi-Valued
No
Required
No
Admin Action Required
None. Modification requires no further action

hostname-verification-method

Description
The mechanism for checking if the identity provider's hostname matches the name(s) stored inside the server's X.509 certificate. This is only applicable if SSL is being used for connection security.
Default Value
strict
Allowed Values
allow-all - This mechanism turns hostname verification off.

strict - This mechanism works the same way as the Java Runtime Environment. It is also compliant with RFC 2818 for dealing with wildcards. The hostname must match any of the Subject Alternative Names or the first CN. A wildcard can occur in the CN, and in any of the Subject Alternative Names. A wildcard such as "*.foo.com" matches only subdomains in the same level, for example "a.foo.com". It does not match deeper subdomains such as "a.b.foo.com".
Multi-Valued
No
Required
No
Admin Action Required
The OIDC External Identity Provider must be disabled and re-enabled for changes to this setting to take effect. In order for this modification to take effect, the component must be restarted, either by disabling and re-enabling it, or by restarting the server

key-manager-provider

Description
The key manager provider to use if SSL (HTTPS) is to be used for connection-level security. When specifying a value for this property (except when using the Null key manager provider) you must ensure that the external server trusts this server's public certificate by adding this server's public certificate to the external server's trust store.
Default Value
The Java Runtime Environment's default key manager will be used
Allowed Values
The DN of any Key Manager Provider. The associated key manager provider must exist and must be enabled if SSL is to be used.
Multi-Valued
No
Required
No
Admin Action Required
The OIDC External Identity Provider must be disabled and re-enabled for changes to this setting to take effect. In order for this modification to take effect, the component must be restarted, either by disabling and re-enabling it, or by restarting the server

trust-manager-provider

Description
The trust manager provider to use if SSL (HTTPS) is to be used for connection-level security.
Default Value
The Java Runtime Environment's default trust manager will be used
Allowed Values
The DN of any Trust Manager Provider. The associated trust manager provider must exist and must be enabled if SSL is to be used.
Multi-Valued
No
Required
No
Admin Action Required
The OIDC External Identity Provider must be disabled and re-enabled for changes to this setting to take effect. In order for this modification to take effect, the component must be restarted, either by disabling and re-enabling it, or by restarting the server

client-id

Description
The client ID assigned by the OpenID Connect Provider.
Default Value
None
Allowed Values
A string
Multi-Valued
No
Required
Yes
Admin Action Required
None. Modification requires no further action

client-secret

Description
The client secret assigned by the OpenID Connect Provider.
Default Value
None
Allowed Values
A string
Multi-Valued
No
Required
Yes
Admin Action Required
None. Modification requires no further action

scope

Description
The scopes to request authorization for. The 'openid' scope is always requested and need not be specified here.
Default Value
None
Allowed Values
A string

Example values
Value Synopsis
profile This scope value requests access to the end-user's default profile claims, which are: name, family_name, given_name, middle_name, nickname, preferred_username, profile, picture, website, gender, birthdate, zoneinfo, locale, and updated_at.
email This scope value requests access to the email and email_verified claims.
address This scope value requests access to the address claim.
phone This scope value requests access to the phone_number and phone_number_verified claims.
offline_access This scope value requests that an OAuth 2.0 refresh token be issued that can be used to obtain an access token that grants access to the end-user's UserInfo endpoint even when the end-user is not present (not logged in).

Multi-Valued
Yes
Required
No
Admin Action Required
None. Modification requires no further action

client-auth-method

Description
The method to use when authenticating to the OpenID Connect provider's token endpoint.
Default Value
basic
Allowed Values
basic - Authenticate using the HTTP Basic scheme where the client ID and secret are used as the username and password.

post - Authenticate by including the client ID and secret in the request body.

none - Do not authenticate to the token endpoint.
Multi-Valued
No
Required
Yes
Admin Action Required
None. Modification requires no further action

issuer

Description
The URL that the OpenID Connect Provider asserts as its Issuer Identifier. The URL should use the https scheme and have no query or fragment component.
Default Value
None
Allowed Values
A string
Multi-Valued
No
Required
Yes
Admin Action Required
None. Modification requires no further action

authorization-endpoint

Description
The URL of the OpenID Connect Provider's OAuth 2.0 Authorization Endpoint.
Default Value
None
Allowed Values
A string
Multi-Valued
No
Required
Yes
Admin Action Required
None. Modification requires no further action

token-endpoint

Description
The URL of the OpenID Connect Provider's OAuth 2.0 Token Endpoint.
Default Value
None
Allowed Values
A string
Multi-Valued
No
Required
Yes
Admin Action Required
None. Modification requires no further action

userinfo-endpoint

Description
The URL of the OpenID Connect Provider's UserInfo Endpoint.
Default Value
None
Allowed Values
A string
Multi-Valued
No
Required
Yes
Admin Action Required
None. Modification requires no further action


dsconfig Usage

To list the configured External Identity Providers:

dsconfig list-external-identity-providers
     [--property {propertyName}] ...

To view the configuration for an existing External Identity Provider:

dsconfig get-external-identity-provider-prop
     --provider-name {name}
     [--tab-delimited]
     [--script-friendly]
     [--property {propertyName}] ...

To update the configuration for an existing External Identity Provider:

dsconfig set-external-identity-provider-prop
     --provider-name {name}
     (--set|--add|--remove) {propertyName}:{propertyValue}
     [(--set|--add|--remove) {propertyName}:{propertyValue}] ...

To create a new OIDC External Identity Provider:

dsconfig create-external-identity-provider
     --provider-name {name}
     --type oidc
     --set enabled:{propertyValue}
     --set client-id:{propertyValue}
     --set client-secret:{propertyValue}
     --set issuer:{propertyValue}
     --set authorization-endpoint:{propertyValue}
     --set token-endpoint:{propertyValue}
     --set userinfo-endpoint:{propertyValue}
     [--set {propertyName}:{propertyValue}] ...

To delete an existing External Identity Provider:

dsconfig delete-external-identity-provider
     --provider-name {name}