Configuring DX Compose to use an OIDC identity provider
This topic provides the steps to enable an OpenID Connect (OIDC) identity provider (for example, Google, Facebook) to authenticate a user to HCL Digital Experience (DX) Compose. In this scenario, the user does not log in to DX Compose, but to an OIDC identity provider.
Limitation
Currently, the user authenticated to DX Compose through an external identity provider must reside in the DX Compose user registry, generally an LDAP server. These steps do not support transient users (that is, users not in the registry) at this time.
Prerequisites
A DX Compose system administrator must create an account in the identity provider and obtain the following information:
- clientID
- clientSecret
- hostname (for the discovery endpoint URL and jwt URL)
- userIdentifier
Enabling OIDC authentication in DX Compose
After securing the required information from the OpenID Connect identity provider, the administrator must make these parameters available to DX Compose.
During DX Compose installation, there is a file named oidc.yaml located in the install-hcl-dx-deployment/oidc subdirectory of the Kubernetes node where you ran helm install. An administrator must fill out the oidc.yaml file and use this file during a helm upgrade operation to integrate DX Compose to the external identity provider.
Refer to the following steps to enable OIDC authentication in DX Compose:
-
Edit the
oidc.yamlfile and enter the following required parameters from the identity provider:- clientID
- clientSecret
- hostname (for the discovery endpoint URL and jwt URL)
- userIdentifier
-
In the
oidc.yamlfile, configure the following properties underConfigService.properties:redirect.logouttotrueredirect.logout.ssltotrueredirect.logout.urlto the URL to be shown to the user after logout
This configuration forces the logout screen to the identity provider instead of the default DX Compose logout screen. This also ensures that any relevant HTTP cookies are cleared and the user is actually logged out.
-
Run
helm upgradeto apply the changes to DX Compose.Note that you must specify two file (
-f) parameters in thehelm upgradecommand. The first-fis the YAML file with all DX Compose values apart from OIDC. The second-fis theoidc.yamlfile. See the following sample command:helm upgrade -n dxns -f install-deploy-values.yaml -f ./install-hcl-dx-deployment/oidc/oidc.yaml dx-deployment ./install-hcl-dx-deploymentFor more information, see Upgrading the Helm deployment.
Accessing the Portal login page directly
In cases where you may need to bypass OIDC authentication (for example, when authenticating as an LDAP user), you can access the portal login page directly by appending the following path to your base portal URL:
/poc?uri=nm:oid:wps.Login
https://example.com/wps/poc?uri=nm:oid:wps.Login.
Alternatively, you can use a friendly URL configured for your portal login page.