OpenIDConnect configuration entries
The OpenIDConnect service configuration file is located at $FGLDIR/web_utilities/services/openid-connect/res/configuration.
The following table lists configuration entries used by the OpenIDConnect service in common Single sign-on (SSO) workflows.
| Entry | Description | Default |
|---|---|---|
oidc.accesstoken.decode |
Enables decoding of the Access Token so roles and scopes provided by the identity provider can be retrieved. By default, only the ID token is decoded. See Enable access token decoding. Values:
Important:
Make sure the access token’s |
|
oidc.app.start.mode |
Controls how the service redirects the browser to start the initial Genero application after the SSO handshake has granted access. See Configure application starting mode. Values:
|
|
oidc.authenticate.redirect |
Specifies the redirect method used to send the authentication request when an HTTP 302 redirect is not suitable for the IdP or user agent. See Configure OAuth redirect with automatic form submit. Values:
|
|
oidc.client.check |
Controls how the OpenIDConnect service verifies that all requests for the same SSO workflow come from the same client IP address. See Configure management of client remote IP address. Values:
|
|
oidc.logout.default.end_url |
Specifies the default URL where the |
/demos.html |
oidc.logout.identifier |
Specifies the parameter used by the OpenID Connect provider to identify the user during a logout request. For an example of use, go to Configure SSO logout from AWS Cognito. The value depends on the requirements of your Identity Provider (IdP). Check your IdP documentation to determine which parameter is needed. Values:
|
|
oidc.logout.post_redirect |
Defines the logout parameter that provides the redirect URL to the Identity Provider. The required parameter depends on your IdP, so refer to the provider’s documentation to determine the correct value. Values:
|
|
oidc.oauth.request.format |
Defines the format used during OAuth ID token exchange. Applies only if the IdP uses OAuth2 and requires the authentication to be performed in JSON. See Set exchange format for OAuth ID token. Values:
If the IdP uses the OpenID Connect protocol instead of OAuth2, this entry is not taken into
account, as |
|