Skip to content

Create and Manage OIDC

OIDC (OpenID Connect) is an identity layer based on OAuth 2.0 and an identity authentication standard protocol based on the OAuth2 protocol.

If your enterprise or organization already has its own account system, and your enterprise user management system supports the OIDC protocol, you can use the OIDC protocol-based identity provider feature provided by the Global Management instead of creating usernames/passwords for each member in DCE 5.0. You can grant permissions to use DCE 5.0 resources to these external user identities.

The specific operation steps are as follows.

  1. Log in to DCE 5.0 as a user with admin role. Click Global Management -> Access Control at the bottom of the left navigation bar.

    access control

  2. On the left nav bar select Identity Provider , click the OIDC -> Create an Identity Provider

    click create

  3. After completing the form fields and establishing a trust relationship with the identity provider, click Save . oidc

    Fields Descriptions
    Provider Name displayed on the login page and is the entry point for the identity provider
    Authentication Method Client authentication method. If the JWT is signed with a private key, select JWT signed with private key from the dropdown. For details, refer to Client Authentication.
    Client ID Client ID
    Client Secret Client Secret
    Client URL One-click access to login URL, Token URL, user information URL and logout URL through the identity provider's well-known interface
    Auto-associate After it is turned on, when the identity provider username/email is duplicated with the DCE 5.0 username/email, the two will be automatically associated

Note

  1. After the user completes the first login to DCE 5.0 through the enterprise user management system, the user information will be synchronized to Access Control -> User List of DCE 5.0.
  2. Users who log in for the first time will not be given any default permissions and need to be authorized by an administrator (the administrator can be a platform administrator, submodule administrator or resource administrator).
  3. For practical tutorials, please refer to OIDC Operation Video Tutorials, or refer to Azure OpenID Connect (OIDC) Access Process.

User identity authentication interaction process

The interactive process of user authentication is as follows:

oidc

  1. Use a browser to initiate a single sign-on request for DCE 5.0.
  2. According to the information carried in the login link, DCE 5.0 searches for the proper configuration information in Global Management -> Access Control -> Identity Provider , constructs an OIDC authorization Request, and sends it to the browser.
  3. After the browser receives the request, it forwards the OIDC authorization Request to the enterprise IdP.
  4. Enter the username and password on the login page of the enterprise IdP. The enterprise IdP verifies the provided identity information, constructs an ID token carrying user information, and sends an OIDC authorization response to the browser.
  5. After the browser responds, it forwards the OIDC authorization Response to DCE 5.0.
  6. DCE 5.0 takes the ID Token from the OIDC Authorization Response, maps it to a specific user list according to the configured identity conversion rules, and issues the Token.
  7. Complete single sign-on to access DCE 5.0.

Comments