Configuring OIDC authentication
You can configure HTTP access services such as HCL Nomad to use OpenID Connect (OIDC) authentication rather than LDAP authentication or local authentication.
Before you begin
Configure the HTTP access service you will enable for OIDC. For HCL Nomad instructions, see Nomad server in the Nomad administration documentation.
About this task
OIDC authentication delegates user authentication to a OIDC identity provider (IdP) such as Domino OIDC provider. When OIDC is configured, users log on to an HTTP access service with their OIDC IdP identities.
To configure OIDC authentication for an HTTP access service, complete the following steps.
Procedure
-
(Linux only) Install OIDC Service Provider support for SafeLinx. On Linux, you
can choose to install SafeLinx OIDC support by selecting "y"
(yes) at the prompt Install OIDC Service Provider
support? To install support for OIDC after SafeLinx installation
from the installer archive, run the following command:
sudo rpm -ivh HCLSafeLinx-oidc-<safelinxversion>.rpm.For example: sudo rpm -ivh HCLSafeLinx-oidc-1.4.4.rpmNote: OIDC Service Provider support is installed automatically on Windows.
-
To enable OIDC, complete the following steps to start a local OIDC service
provider on the SafeLinx server.
-
OIDC service can be started only if
oidc.config.ymlfile is present. -
A valid
oidc.config.ymlfile should have all the required inputs to SafeLinx-oidc service to work as expected. Find<SafeLinx installation path>/oidc/oidc.confif.example.ymlfile got all required details to configure yml file properly. - OIDC can be configured in SafeLinx Administrator in the Mode tab (Select OIDC IDP & provider the valid service provider address).
-
The IDP URI & port should match with the
login_uri& port inoidc.config.ymlfile. -
<SafeLinx service URL>/sl_oidc/callbackshould be registered as redirect URI in OIDC Provider.
-
OIDC service can be started only if