vaadin-sso-kit-cidaas-demo | configure Cidaas and use it as a SSO provider
kandi X-RAY | vaadin-sso-kit-cidaas-demo Summary
kandi X-RAY | vaadin-sso-kit-cidaas-demo Summary
vaadin-sso-kit-cidaas-demo is a Java library. vaadin-sso-kit-cidaas-demo has no bugs, it has no vulnerabilities, it has build file available, it has a Permissive License and it has low support. You can download it from GitHub.
This project showcases a minimal setup of Cidaas, so you can use it together with Vaadin SSO Kit as an SSO identity manager in the Vaadin application. Please take into account that the tutorial was created in January 2023, and the involved technologies may have changed since then. Especially the screenshots do not have to be 100% accurate anymore.
This project showcases a minimal setup of Cidaas, so you can use it together with Vaadin SSO Kit as an SSO identity manager in the Vaadin application. Please take into account that the tutorial was created in January 2023, and the involved technologies may have changed since then. Especially the screenshots do not have to be 100% accurate anymore.
Support
Quality
Security
License
Reuse
Support
vaadin-sso-kit-cidaas-demo has a low active ecosystem.
It has 0 star(s) with 0 fork(s). There are 1 watchers for this library.
It had no major release in the last 6 months.
vaadin-sso-kit-cidaas-demo has no issues reported. There are no pull requests.
It has a neutral sentiment in the developer community.
The latest version of vaadin-sso-kit-cidaas-demo is current.
Quality
vaadin-sso-kit-cidaas-demo has no bugs reported.
Security
vaadin-sso-kit-cidaas-demo has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
License
vaadin-sso-kit-cidaas-demo is licensed under the Unlicense License. This license is Permissive.
Permissive licenses have the least restrictions, and you can use them in most projects.
Reuse
vaadin-sso-kit-cidaas-demo releases are not available. You will need to build from source code and install.
Build file is available. You can build the component from source.
Installation instructions, examples and code snippets are available.
Top functions reviewed by kandi - BETA
kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of vaadin-sso-kit-cidaas-demo
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of vaadin-sso-kit-cidaas-demo
vaadin-sso-kit-cidaas-demo Key Features
No Key Features are available at this moment for vaadin-sso-kit-cidaas-demo.
vaadin-sso-kit-cidaas-demo Examples and Code Snippets
No Code Snippets are available at this moment for vaadin-sso-kit-cidaas-demo.
Community Discussions
No Community Discussions are available at this moment for vaadin-sso-kit-cidaas-demo.Refer to stack overflow page for discussions.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install vaadin-sso-kit-cidaas-demo
To run the demo, you have to configure Cidaas first. In this tutorial, we will do the following:.
create a Cidaas account and Cidaas IAM instance in it
create at least one user in this new IAM instance
create an OIDC client (an "App" in Cidaas terms) configuration so our application can use the IAM instance for login
Go to https://www.cidaas.com/ → Pricing → Choose "cidaas IAM" product → Choose Free Tier → Create an account
After registering, create a new company in Cidaas administration
After the company has been created, choose "Individual / Free" plan
That will bring you to the instance creation screen
Wait until the instance is created and then go to the Admin portal (e.g. https://xxxxxxx-prod.cidaas.eu/admin-ui - just replace xxxxxxxx with the name of your instance)
Go to Users → "Create user"
Here we will create a user, which we will use to test the demo application login. Fill in user details as you like, for example:
Go to Apps → App Settings → Click on the "Create New App" button
Here we will create an instance of an OIDC client to which our demo application will connect to. Fill in the details as you like. We've selected the "Single page" app type, but I believe other values would also work.
Click next, and on the following App settings screen, fill in the following fields: Scope → openid, profile, email, roles Redirect URLs: http://localhost:8080/login/oauth2/code/cidaas Allow logout URLs: http://localhost:8080
Click next, and on the last page of the app creation wizard, fill in any details about your company:
Go to Apps → App Settings and lookup your newly created app
Click on the edit button to open the details of the app
Copy app "Client id" and "Client Secret" and use them in application.properties in this project (see Vaadin application setup below)
Note that at the time of this tutorial creation, there was a problem in Cidaas app processing, where the signing key of your newly created app was not immediately added to https://xxxxxxx-prod.cidaas.eu/.well-known/jwks.json. This JSON is used as a source of known singing keys by the SSO Kit, and a missing key caused SSO Kit not to work. Therefore, it was necessary to wait some time (24 hours) before the key was added to this JSON. This problem was reported to Cidaas and is likely already fixed by now. You can verify that all is ok by checking that the app signing key ID is present in https://xxxxxxx-prod.cidaas.eu/.well-known/jwks.json. If it's not there, then you have to wait. The key id can be found in app settings under Advanced Settings -> Certificates:
Go to Advanced settings of the app
In the OAuth2/OIDC Settings, set the following values: Response Types: only "code" Grant Types: only "authorization_code" Backchannel logout URI: http://localhost:8080/logout/back-channel/cidaas Backchannel logout session: set to enabled
No other changes in the Advanced Settings of the app were necessary, and all other options were set to their default values
That's it. Your Cidaas provider is now ready
You must modify the application.properties and fill in the Cidaas-specific values to the oauth2 configuration for this application to work. You can find all Cidaas-specific values in the configuration of your Cidaas instance (https://xxxxxxx-prod.cidaas.eu/admin-ui ) → go App Settings → find app which you created in previous steps → click on edit button -> "Client id" and "Client Secret" can be found there. Please modify the following properties in application.properties:.
create a Cidaas account and Cidaas IAM instance in it
create at least one user in this new IAM instance
create an OIDC client (an "App" in Cidaas terms) configuration so our application can use the IAM instance for login
Go to https://www.cidaas.com/ → Pricing → Choose "cidaas IAM" product → Choose Free Tier → Create an account
After registering, create a new company in Cidaas administration
After the company has been created, choose "Individual / Free" plan
That will bring you to the instance creation screen
Wait until the instance is created and then go to the Admin portal (e.g. https://xxxxxxx-prod.cidaas.eu/admin-ui - just replace xxxxxxxx with the name of your instance)
Go to Users → "Create user"
Here we will create a user, which we will use to test the demo application login. Fill in user details as you like, for example:
Go to Apps → App Settings → Click on the "Create New App" button
Here we will create an instance of an OIDC client to which our demo application will connect to. Fill in the details as you like. We've selected the "Single page" app type, but I believe other values would also work.
Click next, and on the following App settings screen, fill in the following fields: Scope → openid, profile, email, roles Redirect URLs: http://localhost:8080/login/oauth2/code/cidaas Allow logout URLs: http://localhost:8080
Click next, and on the last page of the app creation wizard, fill in any details about your company:
Go to Apps → App Settings and lookup your newly created app
Click on the edit button to open the details of the app
Copy app "Client id" and "Client Secret" and use them in application.properties in this project (see Vaadin application setup below)
Note that at the time of this tutorial creation, there was a problem in Cidaas app processing, where the signing key of your newly created app was not immediately added to https://xxxxxxx-prod.cidaas.eu/.well-known/jwks.json. This JSON is used as a source of known singing keys by the SSO Kit, and a missing key caused SSO Kit not to work. Therefore, it was necessary to wait some time (24 hours) before the key was added to this JSON. This problem was reported to Cidaas and is likely already fixed by now. You can verify that all is ok by checking that the app signing key ID is present in https://xxxxxxx-prod.cidaas.eu/.well-known/jwks.json. If it's not there, then you have to wait. The key id can be found in app settings under Advanced Settings -> Certificates:
Go to Advanced settings of the app
In the OAuth2/OIDC Settings, set the following values: Response Types: only "code" Grant Types: only "authorization_code" Backchannel logout URI: http://localhost:8080/logout/back-channel/cidaas Backchannel logout session: set to enabled
No other changes in the Advanced Settings of the app were necessary, and all other options were set to their default values
That's it. Your Cidaas provider is now ready
You must modify the application.properties and fill in the Cidaas-specific values to the oauth2 configuration for this application to work. You can find all Cidaas-specific values in the configuration of your Cidaas instance (https://xxxxxxx-prod.cidaas.eu/admin-ui ) → go App Settings → find app which you created in previous steps → click on edit button -> "Client id" and "Client Secret" can be found there. Please modify the following properties in application.properties:.
Support
For any new features, suggestions and bugs create an issue on GitHub.
If you have any questions check and ask questions on community page Stack Overflow .
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page