OpenID Connect - OIDC

Settings on the OpenID Connect (OIDC) tab (pictured below) specify the configuration that allows the On-Premise License Server to access information stored in the authentication server.

The On-Premise License Manager implements the authorization code flow and needs to obtain client id and client secret so users can log in with the OIDC identity provider (IDP).

Note

The License Manager must be configured as an application on the OIDC identity provider (IDP) side, for example, Okta. Use the callback URL displayed in the OIDC settings as the redirect URI.

client ID and client secret are unique identifiers that will be used to authenticate the On-Premise License Manager with your OIDC server.

By configuring OIDC:

  • License administrators can assign license seats to users by users’ names.

  • Your teammates can log into the Licensing Portal using their OIDC credentials.

SLM Configuration Authentication Method

Here are definitions for the values requested in the configuration fields:

Option

Description

Name

Descriptive name of the configuration

URL

OIDC server URL

Use PKCE

Toggle the switch to use the PKCE-enhanced Authorization Code Flow. For more information, see Authorization Code Flow with Proof Key for Code Exchange (PKCE) from Okta.

Client ID

Unique identifier for the On-Premise License Manager on the OIDC server.

Client secret

Unique string paired with the Client ID value for the On-Premise License Manager on the OIDC server.

Scope

Scopes are permissions that your application will need to access user data. You will need to add openid, profile. In some environments, the email scope will also be required. The OIDC server will only grant the scopes that you have requested.

User Name

Specifies the name of the claim in the JWT token that contains the user's username. This can include email and name.

JWT group claim name

Specifies the name of the claim in the JWT token that contains the list of groups the user belongs to.

Group Filter Enabled

Toggle the switch to use group filtering and manage access control based on the group membership. Enable the switch to view the details.

User Group Filter

This option contains the names of groups that designate a user as a regular user. Only users who belong to at least one of these groups are granted access to the system.

Admin Group Filter

A list of group names that identify users as administrators.

Callback URL to be registered on the OIDC server

Use this URL as the redirect URI in the OIDC server settings.

Note

The filters in OIDC settings apply only to users authenticated via the OIDC server. Service accounts do not have groups assigned.

Test your configuration

After configuring the OIDC method, the Log in with OIDC button shows on the login page. Users must use this button to log in.

Log in to License Management

For more information on Open Connect ID, see How Open ID Connect Works.

Publication date: