OIDC Configuration
erm4sn supports authentication via OpenID Connect (OIDC), enabling users to log in securely using identity providers such as Microsoft Azure AD, Okta, LinkedIn, and others.
Configuring an OIDC Provider
To integrate erm4sn with an OIDC provider, configure the following parameters in your identity provider’s settings:
Required OIDC Settings
Setting | Value Example | Description |
---|---|---|
Client ID | your-client-id | Unique identifier assigned by the OIDC provider. |
Client Secret | your-client-secret | Secret key for authentication (keep this secure). |
Redirect URI | https://customer.try.erm4sn.com/login/oidc-resolve | The URL where the OIDC provider redirects after authentication. |
Logout URL | https://customer.erm4sn.com/login/oidc-logout | Redirect URL for logout. |
Configuring OAuth 2.0 Scopes
Scopes define what the application can access on behalf of the user. These scopes should be set in your OIDC provider:
Scope | Purpose |
---|---|
openid | Enables authentication via OIDC and allows identity verification. |
profile | Grants access to the user's name and photo. |
email | Provides the user's primary email address. |
When users log in, they will see a consent screen listing the requested scopes and permissions. Ensure the descriptions align with your provider’s OAuth experience.
Example OIDC Provider Configurations
Microsoft Azure AD OIDC Configuration
-
Go to: Azure Portal → Azure Active Directory → App Registrations.
-
Click "New Registration", and set the redirect URI to: https://customer.try.erm4sn.com/login/oidc-resolve
-
Under Authentication, enable ID tokens.
-
Copy the Client ID and Client Secret from the Certificates & Secrets section.
-
Under API Permissions, add:
openid
profile
email
- Save the configuration and use the Issuer URL, Token Endpoint, and User Info Endpoint from Azure in your erm4sn settings.
Okta OIDC Configuration
-
Go to: Okta Admin Console → Applications → Create App Integration.
-
Select OIDC – OpenID Connect and Web Application.
-
Set the redirect URI to: https://customer.try.erm4sn.com/login/oidc-resolve
-
Under General Settings, enable ID Tokens and set response type to
code
. -
Under Scopes, add:
openid
email
profile
- Save the configuration and use Okta’s Issuer URL and endpoints in erm4sn.
LinkedIn OIDC Configuration
-
Go to: LinkedIn Developer Portal → My Apps.
-
Click Create App and configure the OAuth 2.0 settings.
-
Set the Authorized Redirect URLs to: https://customer.try.erm4sn.com/login/oidc-resolve
-
Under OAuth Scopes, add:
openid
email
profile
- Copy the Client ID and Client Secret and configure them in erm4sn.
Testing OIDC Authentication
Once the configuration is complete:
- Log out of erm4sn and navigate to the login page.
- Click Sign in with OIDC Provider.
- Authenticate using your configured OIDC provider.
- Upon successful login, you should be redirected to erm4sn with your user account created or updated.
For enhanced security, enable short-lived tokens and refresh token rotation in your OIDC provider settings.