Table of Contents |
---|
Author: Former user (Deleted), modified by Former user (Deleted)
...
This page describes the Abiquo integration with OpenID Connect available in Abiquo. This integration allows Abiquo to leverage single sign on authentication and federated authorization features. The integration targets the core spec, but also implements some optional features such as the RP-Initiated-Logout from the optional Session Management spec. Discovery, dynamic registration and other optional features are out of the scope of this integration.
Excerpt | |||||||||
---|---|---|---|---|---|---|---|---|---|
|
Basic workflow
Info |
---|
In the OpenID basic workflow, the user interacts with Abiquo (the Application), which is also a client of the OpenID Connect server (the Identity Server) |
The following diagram shows the basic authentication and authorization workflow when using the OpenID Connect integration:
...
Users will access the Abiquo portal, and will be redirected to the OpenID Connect server
Users will enter their credentials to log in to the OpenID Connect server (note that the credentials are never exposed to Abiquo). It will display the consent screen that describes the permissions that Abiquo is requesting and the information it needs to access.
Upon successful authentication and consent grant, the OpenID Connect server issues the following tokens and redirects the user back to the application:
ID token - A JWT token containing the information about the user.
Access token - An OAuth2 token that provides access to the application resources on behalf of the user.
Refresh token - An optional token that can be used to refresh the access token when it expires.
Abiquo will use the access token to request information about the logged user (permissions, etc) and will create the corresponding user in the Abiquo database.
Users will use the access token to access the Abiquo platform, including the Abiquo API
At any time, users with the refresh_token will be able to perform a call to the Abiquo API to refresh the access token.
If the global logout is configured, when users log out from the Abiquo platform they will be signed out from the OpenID Connect server.
ACR validation
In an OpenID Connect Integration, the authorization request could contain a list of authentication modes that the server should show to the user. This is a list of acr-values and it's a configuration of the OpenID Connect Server.
...
When Abiquo is in normal authentication mode, Abiquo authenticates and obtains user authorization from the Abiquo database. In contrast, when the platform is in OpenID Connect mode, Abiquo authenticates and obtains user authorization from the OpenID Connect server. In OpenID mode, Abiquo behaves as follows:
Abiquo creates an Abiquo OpenID user automatically when the following conditions are met
The user successfully authenticates through the OpenID Connect server; AND
Abiquo finds an Abiquo tenant and user role that matches the one specified through the OpenID user data
Every time the user logs in, Abiquo synchronizes user data with the OpenID Connect server, which may overwrite any changes you make to the Abiquo user account
A user that has switched enterprises will be returned to their assigned enterprise when they log in
Abiquo disables login for users with non-OpenID accounts
This includes the main cloud admin user
Abiquo disables features associated with normal authentication, e.g. Abiquo two-factor authentication, Abiquo password reset
The OpenID Connect server should provide this type of feature when authenticating users
OpenID Connect configuration steps
This is an overview of the steps to configure the OpenID Connect Integration
Configure the cloud admin user with Abiquo in normal auth mode
Map OpenID users to Abiquo enterprises and roles with Abiquo in normal auth mode
Register Abiquo as a client application on the OpenID Connect server and obtain OpenID client credentials
Configure the OpenID Connect server in abiquo.properties
Register the Abiquo Outbound API as an OAuth application and configure abiquo.properties
Configure the OpenID Connect logout
Configure Abiquo UI properties
Start the Abiquo Server
Configure API and Outbound API clients to work with an access token
Numberedheadings | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Configure the cloud admin userConfigure the cloud admin user with Abiquo in normal authentication mode. Remember that Abiquo will disable this user when you enable OpenID Connect authentication mode. Map OpenID Connect users to Abiquo enterprises and rolesIn OpenID Connect authentication mode, when a user successfully authenticates through the OpenID Connect server, Abiquo will receive OpenID user data. Abiquo will try to match the user data to the following in Abiquo:
To enable Abiquo to match the user, you must work in Abiquo to map the Abiquo enterprise and role to the OpenID user data. Work in normal authentication mode as the cloud admin user. If Abiquo cannot find the role and enterprise, it will not create the OpenID user. How Abiquo determines which role to assign to an OpenID userThe OpenID Connect server will return user data, including a list of the external roles/permissions for the user, which is called a role claim. Abiquo will identify the role claim in the OpenID user data using the name you configure with the abiquo.openid.role-claim property. Abiquo will try to find an existing Abiquo role with the same LDAP attribute data as the role claim. Map external roles to Abiquo rolesTo map OpenID roles to an Abiquo role:
Remember that a user's external roles must map to one local role in their enterprise and/or one global role. How Abiquo determines which enterprise an OpenID user should belong toThe OpenID Connect server will return user data, including the tenant that a user should belong to, which is called an enterprise claim. Abiquo can look up this enterprise in Abiquo by enterprise name or by enterprise property. If Abiquo cannot find the enterprise, it will not allow the user to log in. If the user account does not exist, Abiquo will create it in the enterprise. If the user account exists in another enterprise, Abiquo will move it to the one assigned by the OpenID Connect server. Abiquo will obtain the enterprise claim defined by the abiquo.openid.enterprise-claim property. Abiquo will try to match the enterprise claim to the enterprise name if the abiquo.openid.enterprise-property property IS NOT SET in abiquo properties. Otherwise, it will try to match the value of the enterprise claim to the value of the enterprise property specified by the abiquo.openid.enterprise-property property. Map external enterprises to Abiquo enterprisesMap external enterprises to Abiquo enterprises according to the lookup method you configured for your platform. To map an OpenID enterprise to an Abiquo enterprise by enterprise name, just name the enterprise with the value in the enterprise claim. To map an OpenID enterprise to an Abiquo enterprise by enterprise property:
When the authorization server returns the enterprise claim, Abiquo will look for all enterprises with a "domain" property, and find the one with the value that matches the value returned by the OpenID Connect server. In this example, when the OpenID Connect server returns the value "abiquo.com" in the enterprise claim, Abiquo will select this enterprise. Register Abiquo as a client application in the OpenID Connect serverRegister Abiquo as a client application in the OpenID system and obtain the client credentials: client name, client id and client secret. You will need to configure these in abiquo.properties in the next step. Configure Abiquo propertiesTo configure OpenID Connect in abiquo.properties:
If your OpenID Connect provider implements the Discovery extension, you might be able to get the value of the different endpoints by going to the well-known configuration endpoint, as described in the provider configuration section. The following sequence diagram shows how the different endpoints are used from a user and relying party perspective. The diagram depicts the interactions between all parties involved in the OpenID Connect protocol. Table of Abiquo OpenID Connect propertiesTo enable the OpenID Connect mode, configure the following properties in Abiquo:
Configure Abiquo outbound API moduleRegister the Outbound API as an OAuth application (for Outbound API user or admin user) and use the tool to obtain the OAuth access token. Configure credentials in abiquo.properties and remove any old credentials properties In OpenID Connect mode, the normal authentication (using HTTP Basic Authentication) is disabled, so you must configure the Outbound API credentials as OAuth tokens. To do this:
Configure OpenID Connect logoutIf the OpenID Connect server implements the Session Management extension, you can configure the Abiquo platform to issue a logout to the OpenID Connect server when the user logs out from the platform. This is optional because users might not want to be logged out from all services when logging out from Abiquo. To enable the global logout, configure the abiquo.openid.endsession.endpoint property to point to the end session endpoint, as defined by the RP-Initiated Logout spec. Configure OpenID Connect client UI propertiesConfigure the OpenID Connect client UI properties in the client-config-custom.json file.
Configure API and outbound clientsIn OpenID Connect mode, Abiquo disables Basic Authentication, so in order to authenticate with the API (or against the Outbound API endpoint), you can use an access token. Abiquo still supports authentication using the session cookie or Abiquo OAuth applications as before To obtain an access token:
Once you have the token, you can issue requests to the API by providing the following HTTP header: |
...