OpenID Connect configuration example
OpenID Connect is an open standard and decentralized authentication protocol that allows authentication by participating sites, known as relying parties (RP). A third-party service lets users log into multiple unrelated websites using a single identity and password. OpenID Connect is an identity layer on top of the OAuth 2.0 protocol, allowing web-based, mobile, and JavaScript clients to request information about authenticated end-users.
The following example is a configuration of the OpenID Connect authentication service provider.
"open_id_connect": [
{
"authentication_mode": "Passive",
"client_id": "<CLIENT_ID>",
"client_secret": "<CLIENT_SECRET>",
"authority": "<AUTHORITY>",
"get_claims_from_user_info_endpoint": false,
"metadata_address": "<METADATA_ADDRESS>",
"max_age": "<MAX_AGE>",
"signed_out_redirect_uri": "<URL>",
"authentication_method": "<AUTHENTICATION_METHOD>",
"response_mode": "<RESPONSE_MODE>",
"response_type": "<RESPONSE_TYPE>",
"prompt": "<PROMPT>",
"email_claim_type": "<CLAIM_TYPE_OVERRIDE>",
"external_user_creation_url": "https://www.registerme.com",
"is_enabled": true,
"messages": {
"signIn": "T_translationKey",
"signInDescription": "T_translationKey",
"signInTitle": "T_translationKey"
},
"provider_name": "OpenIDConnect,",
"username_claim_type": "<CLAIM_TYPE_OVERRIDE>",
"clear_default_scope": false,
"scope": [
"<CUSTOM_SCOPE>"
]
}
]
The OpenID Connect specification includes many properties. You can find more information about these properties and their implementation in the official OpenID Connect, OAuth 2, or .NET OpenID Connect specifications.
Script parameters
Parameter |
Explanation |
---|---|
|
The authentication mode can be set to |
|
A unique identifier for the client application, used to authenticate your Content Hub application with the Identity Provider. |
|
A secret known only to the application and the authorization server, used to authenticate the Content Hub application. |
|
The URL of the OpenID Connect provider, used to discover the provider's configuration and endpoints. |
|
Whether to retrieve claims from the |
|
The URL for the OpenID Connect provider's metadata, which includes endpoint details and supported features. Avoid hosting a copy of this file, as provider certificate changes can break authentication. |
|
The URL where the user is redirected after signing out. |
|
The URL where the authorization server redirects the user after authentication. This must be registered with the authorization server. |
|
The method used for authentication. Possible values include |
|
How the authentication response is returned. Possible values include |
|
The type of response expected from the authorization server. Possible values include |
|
Whether the user should be prompted for re-authentication. Possible values include |
|
The claim type used for the user's email address. |
|
The URL used for creating external users. |
|
Whether OpenID Connect is enabled. This allows temporarily disabling an identity provider without removing its configuration. |
|
Custom messages for the sign-in process. Possible values include |
|
The name of the OpenID Connect provider, also used as the redirect URI in the IdP, formatted as |
|
The claim type that defines the user's username. |
|
Whether to clear the default scope. |
|
The scopes requested during authentication. Possible values include |