Configuring OIDC authentication

You can configure HTTP access services such as HCL Nomad to use OpenID Connect (OIDC) authentication rather than LDAP authentication or local authentication.

Before you begin

Configure the HTTP access service you will enable for OIDC. For HCL Nomad instructions, see Nomad server in the Nomad administration documentation.

About this task

OIDC authentication delegates user authentication to a OIDC identity provider (IdP) such as Domino OIDC provider. When OIDC is configured, users log on to an HTTP access service with their OIDC IdP identities.

To configure OIDC authentication for an HTTP access service, complete the following steps.

Procedure

  1. (Linux only) Install OIDC Service Provider support for SafeLinx. On Linux, you can choose to install SafeLinx OIDC support by selecting "y" (yes) at the prompt Install OIDC Service Provider support? To install support for OIDC after SafeLinx installation from the installer archive, run the following command:
    sudo rpm -ivh HCLSafeLinx-oidc-<safelinxversion>.rpm.
    For example: sudo rpm -ivh HCLSafeLinx-oidc-1.4.4.rpm
    Note: OIDC Service Provider support is installed automatically on Windows.
  2. To enable OIDC, complete the following steps to start a local OIDC service provider on the SafeLinx server.
    1. OIDC service can be started only if oidc.config.yml file is present.
    2. A valid oidc.config.yml file should have all the required inputs to SafeLinx-oidc service to work as expected. Find <SafeLinx installation path>/oidc/oidc.confif.example.yml file got all required details to configure yml file properly.
    3. OIDC can be configured in SafeLinx Administrator in the Mode tab (Select OIDC IDP & provider the valid service provider address).
    4. The IDP URI & port should match with the login_uri & port in oidc.config.yml file.
    5. <SafeLinx service URL>/sl_oidc/callback should be registered as redirect URI in OIDC Provider.