Authenticating Jazz Authorization Server by using an OIDC authentication provider
If you choose to use an OpenID Connect (OIDC) authentication provider for Jazz® Authorization Server (JAS) authentication, complete the following procedure. The Jazz security architecture single sign-on delegates authentication to a separate JAS, which manages the role of an OIDC provider. You can configure the Liberty OIDC provider to delegate the user authentication to your standard corporate OIDC provider by using the social login feature of Liberty.
Before you begin
- Register JAS as a client in your OIDC authentication provider. For more information,
see Configure social login as OpenID Connect client. Provide the
redirect URI in the following
format.
Where:https://<jas-url>/ibm/api/social-login/redirect/<oidc-login-id>-
jas-url - The hostname that is configured during the Engineering Lifecycle Management instance creation.
-
oidc-login-id - The ID to use in the
oidcLoginfield of the OIDC_CONFIG Config Map file.
-
- After you create the application in the OIDC authentication provider, collect the
clientIdandclientSecretfields information. The information is used to create the OIDC_CONFIG file in the configmaps directory.
To create the Config Map elm-auth-type-config using OIDC configuration, use one of the following methods
Red Hat OpenShift Container Platform web console method
Procedure
Red Hat OpenShift CLI method
Procedure
Creation of the secret elm-tls-certs-secret for SSL certificates
Kubernetes CLI
Procedure
Create a secret for OIDC auth provider by using the following command
kubectl create --filename=<folder-path>/<secret-file-name>
kubectl create --filename=/usr/example/elm-tls-certs-secret.yaml
For more information on OIDC, see Fully populated sample YAML of elm-tls-certs-secret OIDC