OIDC¶
This section defaults to standard OIDC Configuration. If you are not using a standard OIDC configuration, you can switch pages for configuration.
Start Configuration¶
- Identity Provider Name: The name of the platform providing identity management services.
- Remarks: Users can add custom descriptive information to record relevant explanations about the identity provider.
- Identity Provider URL: The full URL of the identity provider, which is also the service discovery address. For example: https://guance.example.com.
- Client ID: A unique identifier provided by the authentication service used to identify client applications.
- Client Secret: Used together with the Client ID to authenticate the client application.
- Authorization Request Scope: The scope of the authorization request. By default, it includes
openid
,profile
, andemail
. You can add additional claims such asaddress
andphone
if needed.
Mapping Configuration¶
To implement SSO login, you need to map account information from the Identity Provider (IdP) to Guance account information. The main fields are as follows:
- Username: Required; the "username" field from the identity provider, e.g.,
referred_username
. - Email: Required; the "email" field from the identity provider, e.g.,
email
. - Phone Number: Optional; the "phone number" field from the identity provider, e.g.,
phone
.
Login Control¶
- Access Restrictions: Verifies whether the domain suffix of the login email matches the configured domain. Only matching emails will have access to the SSO login link. User accounts in Guance can be dynamically created during their first login without needing to be pre-created in the workspace.
- Role Assignment: Assigns roles to SSO accounts logging in for the first time. Accounts logging in subsequently are unaffected.
- If SAML mapping is enabled within the workspace, roles will be assigned based on the mapping rules.
- Session Persistence: Sets the idle timeout and maximum duration for SSO login sessions. After timing out, the login session will expire.
User-side Configuration Notes for OIDC
- Authorization Mode: Only supports
authorization_code
authorization mode; its return type must becode
. id_token
Signature Algorithm: Currently only supportsHS256
.-
code
Exchangetoken
Authentication Method:- Default Support:
client_secret_basic
- Custom Methods Supported:
client_secret_post
,client_secret_basic
,none
- Default Support:
-
scope
Range:- Default Scope:
openid
,profile
,email
,phone
- Custom Requirements: Must include
openid
, others can be customized but the result must containemail
, optionally returningphone_number
.
- Default Scope:
Non-standard OIDC Configuration¶
Understanding Non-standard OIDC Configurations?
Non-standard configurations typically occur when customers use Oauth2 for identity authentication. However, the Oauth2 protocol does not specify an interface for obtaining account information, leading to significant differences in how user information is retrieved since successful mapping relationships depend on this step. Additionally, due to varying interface design rules across different customers, there may be inconsistencies in parameter case styles, which also leads to non-standard configurations.
- Navigate to Manage > Member Management > SSO Management > OIDC > Create Identity Provider;
- Click the top-right corner to switch to the standard OIDC configuration page;
- Identity Provider Name: The name of the platform providing identity management services;
- Configuration File Upload: Download the template, fill in the relevant information, and upload it;
- Remarks: Custom-added descriptive information to record relevant explanations about the identity provider;
- Login Configuration.
Obtain URLs¶
After successfully adding an identity provider, you can obtain the Callback URL and the Initiate Login URL.
Field | Description |
---|---|
Callback URL | The callback address agreed upon in the OIDC protocol after successful authentication, used to receive the identity provider's authentication response. |
Initiate Login URL | The entry point address for starting the OIDC login flow from Guance, provided by the identity provider. |
After obtaining these two URLs, they need to be provided to the identity provider.