Configuring OpenID Security Profiles
- Microsoft ADFS
- Salesforce
-
The “/.well-known” endpoint — this is a provider-specific URL which returns essential information about an OpenID application. Some examples include “
https://[server name and app ids]/.well-known/openid-configuration
, where[server name and app ids]
is the provider host name plus any identifiers specific to the desired client application. Each OpenID provider and each registered client application on the provider will be unique. -
The
Client Id
is generated by the authorization provider when a client application is created by your OpenID system administrator.Note: Some providers allowClient Id
values to be user-generated. -
The
Client Secret
is also generated by the provider when the client application is created. -
When configuring the provider, the OpenID system administrator must specify the redirection URI for your Titania Delivery platform. This URI must conform to the following pattern:
https://[hostname]/login/oauth2/code
where [hostname] is your Titania Delivery server platform.Note: OpenID providers use various names for the redirection URI, such as “Callback URLs” or “Authorized redirect URIs”.
- Go to, or create, a Titania Delivery Organization to add a new authentication system.
- Click Authentication Systems.
- In the Portal Authentication Systems page, click New in the OpenID
Providers section.The OpenID Provider window will appear.
- In the Display Name field, enter a label for the OpenID provider. This label should be unique among all OpenID profiles on your TD platform, to avoid ambiguity when selecting a security profile for a portal.
- In the Issuer field, enter your
OpenID Provider Issuer URL. (See Section 2 of the OpenID Connect 1.0 specification and your OpenID provider documentation.)Note: TD expects to find a JSON document describing the OpenID provider configuration by concatenating
/.well-known/openid-configuration
to this URL as described in Section 4 of the OpenID Connect 1.0 specification. DO NOT INCLUDE the/.well-known/openid-configuration
in the issuer URL. - In the Client ID field, enter the
Client Id
created or generated when the client application was created by your OpenID system administrator. - In the Client Secret field, enter
the
Client Secret
generated when the client application was created by your OpenID system administrator. - If your OIDC provider requires custom scopes to process an authorization request, enter them in the Custom scopes field, separated by spaces. Otherwise, leave this field blank. If present, custom scopes will be appended to the default scopes used for the OpenID Connect protocol.
- Click the Save button.Note: Before saving the configuration, the system will validate the issuer URL. If the URL cannot be reached, the configuration will not be saved.
- Note:
-
The OpenID administrator must ensure the authorization provider supports the “openid” scope and either the “email” or the “upn” scopes. This may require modifying the default configuration with some OpenId Connect providers when setting up a client application.
-
The OpenID administrator must ensure the authorization provider complies with
Authorization Code
flow as described in Section 2.1.5.1 End-User Grants Authorization and RFC 6749.