FoxIDs | Support : login , OAuth | Authentication library
kandi X-RAY | FoxIDs Summary
kandi X-RAY | FoxIDs Summary
FoxIDs is an open source Identity Services (IDS) supporting login, OAuth 2.0, OpenID Connect 1.0, SAML 2.0 and convention between SAML 2.0 and OpenID Connect. STATUS: I'm currently working on the documentation and the first FoxIDs release.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of FoxIDs
FoxIDs Key Features
FoxIDs Examples and Code Snippets
Community Discussions
Trending Discussions on FoxIDs
QUESTION
I need to connect an existing IdentityServer4 a FoxIDs tenant. How are IdentityServer4 configured as a FoxIDs up-party?
...ANSWER
Answered 2021-Mar-12 at 15:47You are correct a IdentityServer4 client is configured as a FoxIDs up-party using OpenID Connect.
You can see how IdentityServer4 is configured as an up-party in the documentation. Furthermore, the documentation also reference sample applications showing how to do the integration.
QUESTION
Is it possible to connect FoxIDs to Azure AD with OpenID Connect? Having Azure AD as an up-party OP (IdP) on FoxIDs.
Regards Rune (JO Informatik)
...ANSWER
Answered 2021-Mar-12 at 15:19Yes, it is possible to connect both a single tenant and multitenant Azure AD App as an up-party on FoxIDs using OpenID Connect.
Please also see the documentation.
Configure single tenant
Start creating an OpenID Connect up-party in FoxIDs
- Add the name
- Select show advanced settings
- Select tildes URL binding pattern
It is now possible to read the Redirect URL
and Post logout redirect URL
.
Create the Azure AD App
- Add the name
- Select single tenant
- (It is a Web application) Add the
Redirect URL
- Click Register
- Copy the Application (client) ID
- Copy the Directory (tenant) ID
- Go to the Authentication tab and add the FoxIDs
Post logout redirect URL
asFront-channel logout URL
, click save. - Go to the Certificates & secrets tab and add a client secrets and copy the secret value.
Go back to the FoxIDs up-party
- Add the authority which is
https://login.microsoftonline.com/{Azure AD tenant ID}/v2.0
- Add the profile and email scopes
- Add the Azure AD client ID as a custom SP client ID
- Add the Azure AD client secret value as the client secret
- Select use claims from ID token
- Add claims which is accepted by the up-party. E.g., preferred_username, email, name, given_name, family_name, oid, ipaddr
- Click create.
That is it, you are done. The new up-party can now be selected as a possible up-party in a down-party.
Configure multitenant
The multitenant configuration differs slightly form the single tenant configuration.
In the Azure AD
- During the App creation select multitenant
In the FoxIDs up-party
- Add the authority
https://login.microsoftonline.com/common/v2.0
- Select edit issuer
- Change the issuer to
https://login.microsoftonline.com/{Azure AD tenant ID}/v2.0
, you can possible add multiple issuers
Read claims from access token
If you want to read claims from the access token you need to add one more Azure AD App acting as a resource (API). Expose a scope from the resource app and grant the other Azure AD App the resource app scope. Then add the resource app scope as a scope in the FoxIDs up-party.
By during this the access token is issued by the same OP (IdP) and is thereby accepted.
QUESTION
I have connected an AD FS as SAML 2.0 up-party on FoxIDs and my application is connected with OpenID Connect as down-party.
I'm not receiving a SUB claim in my application, what can be the problem?
...ANSWER
Answered 2021-Apr-09 at 09:55FoxIDs convert between SAML 2.0 and JWT claims. Where the sub
claim is converted from the SAML 2.0 NameID
attribute/claim. The NameID
claim has the claim type http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier
.
Either you need to update the AD FS configuration to also issue the NameID
claim. Which results in a sub
claim with the NameID
claim value.
Alternatively, if the AD FS e.g. are issuing a UPN
(http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn
) claim you can define a claims transformation in FoxIDs mapping the UPN
(http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn
) claim to a NameID
(http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier
) claim. This results in a sub
claim with the UPN
claim value.
To debug you can temporary add a NameID
(http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier
) claim with a constant value, which results in a sub claim.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install FoxIDs
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page