Mobile client support for OIDC authentication
HCL Verse for Android, starting with the 14.5.6 (December 2025) version, supports the Traveler server endpoint configured for OIDC authentication. OIDC provides advanced capabilities for securely managing user credentials on a mobile device which can dramatically reduce the need for prompting users for their credentials for months at a time without losing the ability to revoke sessions from stolen or compromised devices. Along with traditional support for entering usernames and passwords, the addition of Domino OIDC support also includes the ability to use passkey based authentication for managing a user's credentials on their mobile devices.
Support requirements
- HCL Verse for Android 14.5.6 (December 2025) and later clients.
- Traveler server endpoint configured for OIDC authentication (requires HCL Domino 14.5.1 EA1 and higher).
- TLS must be enabled on the Traveler server endpoint.
- TLS certificates can be configured easily using the Domino CertMgr server task. See Managing TLS certificates with Certificate Manager
Limitations
- For the 14.5.1 EA1 preview OIDC support in HCL Verse for Android is limited to a single OIDC account. Other authentication type accounts such as basic auth, CBA, SAML and TOTP can also be created on the same device but only a single OIDC account is supported at this time.
- OIDC authentication support is limited to the HCL Domino support. Authentication proxies that may provide multi-factor authentication are not supported.
- HCL Verse for iOS, HCL Companion, and To Do applications for iOS do not support OIDC Authentication at this time.
- OIDC authentication is not supported by clients that use the Microsoft Exchange ActiveSync protocol, including the Apple iOS Mail client.
- The HCL Traveler for Outlook client does not support OIDC Authentication.
- OIDC authentication is not available when working with encrypted mail. The end user is prompted for their Notes ID password.
- For HCL Verse Android, application passwords are not supported when configured for OIDC authentication. A Traveler server setting or policy setting requiring application passwords will be ignored.
- Android 10 or above are required for passkey support with OIDC.