Configuring transient users in DX Compose with OpenID Connect
This topic provides the steps to enable transient users in HCL Digital Experience (DX) Compose when using an OpenID Connect (OIDC) identity provider. Transient users are authenticated externally through the OIDC provider and do not require a corresponding entry in the local DX Compose user registry. This allows users managed by an external identity provider to access DX Compose without duplicating their accounts locally.
Limitation
The transient user suffix is not currently configurable and is set to o=transparent. Avoid reusing this identifier for non-transient users to prevent conflicts.
Prerequisites
Ensure that OIDC authentication is already enabled and configured in your HCL DX Compose deployment. For more details, refer to Configuring DX Compose to use an OIDC identity provider.
Enabling transient users in DX Compose
Follow these steps to enable transient users in your DX Compose deployment:
-
Fetch the current configuration values from the running Helm release to ensure you preserve existing settings while adding the transient user configuration. Run the following command:
helm get values dx-deployment -n dxns -o yaml -a > custom-values-all.yamlReplace
dx-deploymentwith your Helm release name anddxnswith your namespace if they differ. This command saves the current values to a file namedcustom-values-all.yaml. -
In the
custom-values-all.yamlfile, add or modify the following section to enable transient users:configuration: webEngine: transientUserRegistry: # Enable transient users enabled: trueThis configuration enables the
transientUserRegistryfeature. -
Use the following
helm upgradecommand to apply the updated configuration. Include both the base values file and the modifiedcustom-values-all.yamlfile.helm -n dxns upgrade dx-deployment ./install-hcl-dx-deployment/ -f install-deploy-values.yaml -f custom-values-all.yaml- Replace
dxnswith your namespace, and adjust the paths toinstall-hcl-dx-deploymentand the values files (install-deploy-values.yamlandcustom-values-all.yaml) according to your environment. - The
-fflags specify the base configuration (install-deploy-values.yaml) and the updated configuration (custom-values-all.yaml).
For more information, see Upgrading the Helm deployment.
- Replace
Once the upgrade is successfully applied, you can log in with a transient user authenticated through the OpenID Connect (OIDC) identity provider. Ensure that the transient user is properly authenticated by the external OIDC provider and the o=transparent suffix is correctly configured in the federated repository if applicable. This setup allows seamless access for transient users without requiring local user registry entries in DX Compose.
Enabling transient users for federated repositories
If you are using a federated repository, ensure the following entry exists in your configuration to support transient users:
<participatingBaseEntry name="o=transparent"/>
See the following sample configuration:
<federatedRepository>
<primaryRealm name="FederatedRealm" allowOpIfRepoDown="true">
<participatingBaseEntry name="o=defaultWIMFileBasedRealm"/>
<participatingBaseEntry name="dc=dx,dc=com"/>
<participatingBaseEntry name="o=transparent"/>
</primaryRealm>
</federatedRepository>
For more information on setting up a federated repository, refer to Configuring federated repositories.
Accessing the Portal login page directly
In cases where you may need to bypass OIDC authentication (for example, when authenticating as an LDAP user), you can access the portal login page directly by appending the following path to your base portal URL:
/poc?uri=nm:oid:wps.Login
https://example.com/wps/poc?uri=nm:oid:wps.Login.
Alternatively, you can use a friendly URL configured for your portal login page.