Activate and deactivate users for OIDC
You use the ALTUSER or ALU command to activate users for OIDC.
About this task
Important: Do not assign the AZFOIDC1 authentication
factor to a policy. The OIDC authentication flow does not include prompting for
credentials on an IBM® MFA policy web page.
Procedure
-
Enter the following command to activate a user for OIDC. Note that the fully-qualified domain name
for each user is enclosed in single quotation marks.
ALU [Login ID] MFA(FACTOR(AZFOIDC1) TAGS(SSOID:name IDCLAIM:email) ACTIVE)Where:- [Login ID] is the z/OS® user name.
- ACTIVE activates the AZFOIDC1 authenticator for the user ID.
- SSOID is the SSO user ID to which to map this account.
- IDCLAIM. Optional. Set this to override the ID
CLAIM you set in Table 1. Note: The error
AZF8051E JWT claim error (claim value mismatch)in the IBM MFA server log indicates that IBM MFA is unable to verify the JWT claim for the user ID.
-
If needed, enter the following command to defer activating a user for OIDC:
ALU [Login ID] MFA(FACTOR(AZFOIDC1))Then, at a later time, enter an ALTUSER or ALU command of the following form to activate the AZFOIDC1 authenticator for the user ID:ALU <USERID> MFA(FACTOR(AZFOIDC1) ACTIVE) -
Enter the following command to display IBM MFA information for a user
profile:
LISTUSER [Login ID] MFAMULTIFACTOR AUTHENTICATION INFORMATION: --------------------------------------- FACTOR = AZFOIDC1 STATUS = ACTIVE FACTOR TAGS = SSOID:username IDCLAIM:value -
Instruct the user to open the fully-qualified hostname where
z-mfa-sso is running, at port 8443:
https://fully_qualified_mfa_sso_host_location:8443Note: You may want to have the user bookmark this URL.Acquire MFA Cache Token Credential via OIDC Select an MFA host and enter your mainframe User ID, then Submit the form. : : MFA Host SAF User ID -
Instruct the user to select an MFA host, enter their SAF user ID, and click
Submit.
Note: If the user is not able to select the IBM MFA host, have them refresh the web page.
- Instruct the user to log in with their SSO username and password.
- If the authentication is successful, a cache token credential (CTC) is generated that the user can use to log in to a z/OS application.
-
If needed, enter the following command to deactivate a user for OIDC:
ALU [Login ID] MFA(FACTOR(AZFOIDC1) NOACTIVE)