OIDC OP Settings
The following OIDC OP configuration properties are pre-configured in the "Core Authenticate" container:
# The OIDC OP issuer (used e.g. as "iss" claim in id_token/access_token).
oidc.op.issuer=https://#{var('header.host')}/oidc-op/sls
# OP keystore.
oidc.op.keystore.file=WEB-INF/sls.jks
oidc.op.keystore.type=JKS
oidc.op.keystore.pass=changeit
# Alias of OIDC OP key pair in keystore.
oidc.op.keystore.keypair.alias=sls
# Validity period of the authorization code in seconds.
# Default is 60 sec (1 min), maximally allowed value is 3600 sec (1 hour).
oidc.op.authorization_code.validity.secs=60
# Validity period of the id_token/access_token in seconds.
# Default: 300 seconds (5 minutes)
oidc.op.id_token.validity.secs=120
# What to use as userid in the id_token/access_token.
oidc.op.id_token.userid=${session.getVerifiedCred('username')}
# Validity period of the refresh_token in hours
# Default: 24 hours (one day)
oidc.op.refresh_token.validity.hours=1
# Whether to renew the refresh_token validity at refresh request processing or not.
# Default: false
oidc.op.refresh_token.validity.renew=true
For details on OIDC configuration, please see SLS Administration Guide
Registering a Relying Party
In order to actually use the OIDC OP, registering a Relying Party will be the minimal required action. This can be done through the properties overrides (see Kubernetes overrides for details) by setting a few custom configuration properties. Example:
oidc.op.issuer=OtherCompany
oidc.op.rp.10.client_id=partner_company_id
oidc.op.rp.10.client_secret=some_secret_goes_here
oidc.op.rp.10.redirect_uris=https://other.company.com/oidc/rp
For details on OIDC Relying Party configuration, please see SLS Administration Guide