Using OpenID Connect single sign-on
You can optionally configure the PowerSC GUI server to implement single sign-on (SSO) using the OpenID Connect protocol. You must also configure IBM® PowerSC Multi-Factor Authentication for SSO, as described in IBM PowerSC MFA Installation and Configuration.
You must satisfy the following prerequisites:
- You must already know the OpenID Connect provider hostname, client ID, and client secret. If you do not already have these values, contact your IT department.
- The OpenID Connect application must use the following sign-in redirect URL.
Contact your IT department if needed to configure this setting.
https://uiserver-name/ws/powerscui/sso/callback - A user who attempts to log in to the PowerSC GUI server must be provisioned in IBM PowerSC Multi-Factor Authentication for SSO, as described in IBM PowerSC MFA Installation and Configuration. The associated MFA ID must also belong to the logonGroupList, as described in Adding groups who can perform administrator functions.
To use OpenID Connect single sign-on, perform the following steps:
If the following error is
displayed in the PowerSC GUI uiServer log file, check the JWT
CTC Timeout setting in the IBM
PowerSC Multi-Factor Authentication
server.
An error occurred in authentication, usually because of an
invalid authentication token. This setting sets the time-to-live for all
cache token credentials (CTCs) that are generated from JWTs, and the configured setting
might be insufficient.