IDaaS simplifies the configuration required to connect self-developed enterprise applications and implement single sign-on (SSO).
IDaaS-side configuration
In IDaaS, you can complete the basic configuration by entering the address that the application uses to process single sign-on requests into the Logon Redirect URIs and keeping the default settings for other options.
| Parameter | Description | Example |
Basic configuration (Required) | Logon Redirect URI | The whitelist of Redirect URIs. When the application requests to log on, it carries the | http://www.xxxx/oidc/sso http://www.xxxx/oidc/sso2 |
Authorization scope | For more information, see SSO overview. | All Users | |
Advanced configurations (optional) | User information scopes | The identity information of a user that can be obtained using the UserInfo Endpoint.
| Multi-select: OpenID Multi-select emails Multiple profile selection |
access_token validity period | The | 20 minutes | |
id_token validity period | The For the format of the | 10 hours | |
refresh_token validity period | It is used to obtain a new | 30 days | |
Extended id_token fields | You can extend the payload field in the | - | |
SSO initiator | The OIDC protocol naturally supports application-initiated SSO. If you select | You can initiate this from the portal or the application. | |
Logon initiation address | The application address that is accessed when IDaaS initiates an SSO request. When this address receives a request, it should immediately initiate an /authorize authorization port request. | http://www.xxxx/oidc/login | |
id_token signature algorithm | The signature for the | SHA256 | |
Logoff callback address | The whitelist of application callback addresses after logging off from IDaaS. The application can carry this when initiating an SLO request. | http://www.xxxx.com |
Configurations in the application
The OpenID Connect (OIDC) protocol allows the application to complete the entire logon authentication process using the standard interfaces provided by IDaaS.
The following table describes these API operations.
Parameter | Description | Example |
Issuer | The field in the | https://xxxxx.aliyunidaas.com/oidc1 |
Discovery Discovery | Used to obtain information about the endpoints, supported patterns, and parameters that are currently supported by IDaaS. It is publicly accessible. | https://xxxxx.aliyunidaas.com/oidc1/.well-known/openid-configuration |
Authorization Authorization | The endpoint where the application requests SSO. | https://xxxxx.aliyunidaas.com/oidc/authorize |
Token Token | The interface address where the application, after obtaining the authorization code | https://xxxxx.aliyunidaas.com/oauth2/token |
Token revocation Revocation | The endpoint that is used to revoke an issued token. | https://xxxxx.aliyunidaas.com/oauth2/revoke |
Public key endpoint for signature verification JWKS | The public key endpoint used to verify the | https://xxxxx.aliyunidaas.com/oidc1/slo |
User information Userinfo | The endpoint for obtaining basic user information using an | https://xxxxx.aliyunidaas.com/oidc1/userinfo |
End session endpoint SLO | The user logs off from the primary logon state of IDaaS. | - |
For more information, see Connect a self-developed application for SSO.