SSO OAuth 2.0 integration guide
Introduction
About This Document
This page is a guide for configuring and using OAuth 2.0 integration in Ubisecure SSO. This applies for OpenID Connect and Mobile Connect integrations as well.
It describes how a Ubisecure SSO Administrator can add and configure a trusted OAuth2 Relying Party.
Prerequisites
Before commencing, you need to know the redirect_uri address of the Relying Party to be connected. This the address to which the authorization response will be sent.
For browser based applications, this is typically a public internet facing address accessible by the end users.
For other client applications (using embedded browsers), this can be a non-existent address that is listened for by the application.
OAuth 2.0 Agent Creation
Log in into Ubisecure SSO and follow the steps below to complete the task.
Start the configuration by creating a new site. Give a name to the site. E.g. 'Online web shop'.
Create a new application
Name it e.g. 'OAuth Agent' or after the application, select Application type as 'OAuth 2.0' and check the 'Enable' check box. Click 'OK'
Click ‘Update’ to save the configuration
- Go to the ‘Authorization policies’ tab now, and create a new policy e.g. ‘Online web shop AP’. Go to ‘Attributes’ tab to add attributes
The following attributes can be added to the Agent’s Authorization Policy
The Authorization Policy defines which attributes are available to a relying party in the id_token and the userinfo endpoint.
Because some attributes may be multi-valued, each attribute value is sent by default as a JSON array. If it is known that there is only one permitted attribute, set the attribute name in the “Single Value Attributes” sections of the Authorization tab. The format of the data will change in this case to a string.
Where possible, it is recommended to follow common specifications in attribute names. OpenID Connect defines specific attribute values at http://openid.net/specs/openid-connect-core-1_0.html#Claims .
[OPTIONAL] Defining single value attributes
Select the Application to use this authorization policy
Enable the authentication method for the application by checking the check box and press ‘Update’ -button below
Allow eIDMUser group to use this application and click ‘OK’
Now the Application is configured to use OAuth 2.0.
They have the earlier generated client_id and secret to the application development.
The information that an application developer needs are:
client_id | Contained in file generated when Activate is pressed |
secret | Contained in file generated when Activate is pressed |
| This publically available URL returns all of the required OAuth2 endpoints in JSON format. |