Configuring the identity provider for an OpenID Connect SSO authentication service
Version:
To enable the system to verify the identity of requestors, configure the identity provider for your OpenID SSO authentication service. You configure the identity provider by importing values from a file or by entering them manually.
-
Open the service from the navigation panel in Dev Studio by clicking
and choosing a service from the instance list. -
On the OpenID Connect tab, navigate to the OpenID Connect provider configuration section.
-
If you are configuring the identity provider by importing the configuration, complete these steps:
-
Click Import metadata.
-
Select the source of the metadata ( via URL or via file ), and then enter the URL or file path.
URL is in the format:
https://
<domain name>/.well-known/openid-configuration
-
Click Submit.
When you import the provider metadata, the platform does the following actions, depending on whether the Signature truststore field is blank at the time of import.- If the Signature truststore field is blank, the system creates a keystore instance and adds the certificate to the new keystore instance. The system sets the alias of the entry in the keystore to the certificate's issuer name and sets the keystore password to
rules
. The system populates the Signature truststore field with the new keystore identifier. - If the Signature truststore field is not blank and refers to a valid keystore instance that was originally created by the system (keystore name starts with "KS" and ends with "OIDCCertStore"), the system adds the certificate to the existing keystore instance and sets the alias of the entry to the certificate's issuer name.
-
-
If you are configuring the identity provider by entering values manually, complete these steps:
-
In the Authorization endpoint field, enter the authorization endpoint URL.
-
In the Token endpoint field, enter the token endpoint URL.
- Optional:
In the Userinfo endpoint field, enter the userinfo endpoint URL.
- Optional:
In the Logout endpoint field, enter the logout endpoint URL.
-
In the Redirect URI field, enter the redirect URI.
-
In the Issuer field, enter the certificate issuer.
-
In the Signature truststore field, press the Down Arrow key and select the keystore that contains the public key that is used for verifying the signature of the authentication assertion.
-
To add parameters for any of these fields, click Add parameters.
-
-
Navigate to the Client information section and complete the Client identifier, Client secret, and Scope fields.
-
In the Operator identification section, in the Map operator id from claim field, specify the name of the claim that contains the operator ID. Enclose the attribute name in curly braces, for example, {name}.
- Optional:
-
Click Save.
- Configuring the identity provider for an OpenID Connect SSO authentication service – Advanced Configuration
You can fine-tune the interaction of Pega Platform and your OpenID Connect authentication provider by supplying additional parameters.
- Authentication services
To override or extend the default authentication process, create and configure an authentication service.
- More about authentication services
This page describes additional topics relevant to authentication services that are not directly referenced on the rule form.
- Configuring an OpenID Connect SSO authentication service
After you create an OpenID Connect SSO authentication service, configure it so that Pega Platform uses the specified identity provider for authenticating users. You can map claims from the OpenID Connect provider to properties in Pega Platform, and configure optional features such as preauthentication and postauthentication activities and operator provisioning.