HomeGuidesRecipesAPI
HomeGuidesAPILog In
Guides
These docs are for v12.0. Click to read the latest docs for v31.

OpenID Connect

📘

Deployment Feature Availability

Available in on-premise and private instance cloud deployments only.

📘

Interface Feature Availability

Available in web interfaces Produce, Manage and Design only.

Overview

OpenID Connect (OIDC) is an authentication layer that sits on top of OAuth 2.0. SmartIQ supports the use of OpenID Connect Implicit Flow to handle authentication.

Configuration

OpenID Connect configuration options are set in the appsettings.json file.

"Authentication": {
  "OpenIDConnect": {
    "ClientId": "...",
    "ClientSecret": "...",
    "Authority": "...",
    "MetadataAddress": "...",
    "Scope", "...",
    "ResponseType": "id_token"
  }
}

Attributes

AttributeDescription
ClientIdRequired, Unique id that represents this application.
ClientSecretOptional, shared secret to prove the request comes from right app.
AuthorityRequired, URL to redirect to the identity provider. eg. Google https://accounts.google.com/, Azure https://login.microsoftonline.com/{tenant}
MetadataAddressOptional, URL to the configuration documentation. This configures the authentication. The web server must be able to request this URL. If empty the OpenId Connect standard of appending ".well-known/opened-configuration" to the "Authority" value is followed.
ScopeOptional, The types of claims to request from the IDP. By default only "openid" is requested. If this configuration has a value then the first value must be "openid". Other values are space delimited eg "openid profile email"
ResponseTypeRequired, The only supported response type is "id_token"

IDP Setup

When configuring applications for SmartIQ within your chosen identity provider, you will need the Redirect Uri for Manage and Produce. The format is, your SmartIQ domain appended with the following:

For Manage:

  • /manage/

For Produce:

  • /produce/

The return URL is often validated against the URL that is entered in the IDP configuration. SmartIQ will set the return URL to the address the user browsed to the site on. Typically https://server/produce or http://server/manage.

📘

Note

The return URL is often case sensitive and needs to match the exact case for the relevant pathway on your domain.

OpenID Connect typically requires HTTPS to be enabled on the IDP site and SmartIQ. Not having HTTPS enabled on SmartIQ can cause a redirect loop.

The default claims that are supported are sub, name, email, given_name, family_name, phone_number. Others can be mapped in Manage > Settings > User Profile Mapping.
The claims must be returned within the id_token to be extracted and used for mapping.

📘

Note

AzureAD groups are not yet supported