Page History
...
- the OIDC Identity Provider product has to be installed and has to be accessible for JOC Cockpit and
- the following a number of settings have to be specified:
Example for Keycloak
Example for Azure
Explanations:
Name | Value | Description | Example |
OIDC Name | The name of the OIDC Identity Service. | This is the name of the Identity Service. It is used by JOC Cockpit to show the caption of the assigned login button. | Google, Keycloak |
OIDC Authentication URL | The URL used by the Client to login to the OIDC Identity Provider. | This URL is called by the Client for login and returns the Access Token from the OIDC Identity Provider. It is similarly used when reading settings of the OIDC Identity Provider with the /.well-known/openid-configuration URL and is used as the issuer during token verification. | Keycloak: https://keycloak:8283/auth/realms/JOC Azure: https://sts.windows.net/<tenant-id>/.well-known/openid-configuration |
OIDC Client ID | The Client ID is configured in the OIDC Identity Provider. | The Client ID is used for a number of calls to to the OIDC Identity Provider. |
|
| The Client Secret is configured in the OIDC Identity Provider. | The Client Secret is used for a number of calls to the OIDC Identity Provider. |
|
OIDC Image | An image can be uploaded that is displayed with the login page. | Optionally an image can be uploaded. . | |
OIDC Truststore Path | The Path to a truststore. | Should the OIDC Identity Provider be configured for HTTPS connections then the indicated truststore has to include an X.509 certificate specified for the Extended Key Usage of Server Authentication.
oidc-truststore.p12
| Use of Java truststore: /usr/lib/jvm/java-17-openjdk/lib/security/cacerts |
OIDC Truststore Password | Truststore password | If the OIDC Identity Provider is configured for HTTPS connections and the indicated truststore is protected by a password then the password has to be specified. | secret Use of Java truststore: changeit |
OIDC Truststore Type | Truststore type | If the OIDC Identity Provider is configured for HTTPS connections then the type of the truststore has to be specified being either | Use of Java truststore: PKCS12 |
OIDC Login
Once OIDC Identity Services have been configured they are displayed in JOC Cockpit's login screen like this:
...