Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Info

Starting with IdP 4.2 you can the install the latest plugin version supported on your IdP version with
.\plugin.sh -I net.shibboleth.idp.plugin.oidc.op

Plugin

Plugin ID

Module(s)

Latest Version

Depends on

Bug Reporting

OIDC OP Extension

net.shibboleth.idp.plugin.oidc.op

idp.oidc.OP.3

3

idp.oidc.

2.0: download

config.3

https://shibboleth.atlassian.net/browse/JOIDC

Please review the OPReleaseNotes when installing or updating this plugin.

Note

Dependencies

This plugin depends on the Shibboleth OIDC Common plugin, and you must first install OIDCCommon. The installer will prevent installation if this is not in place.

Since version 3.4.0, you must also install OIDCConfig.

Expand
titlePlugin Installation Example
Include Page
PluginInstallation
PluginInstallation

...

The additional files created in conf/examples (oidc-attribute-resolver.xml and oidc-attribute-filter.xml) are intended as a source of examples to copy into your own files. The most critical definitions needed are the rules for creating and releasing the "sub" claim, as that as is a required OIDC feature (see OIDC OP#ClaimSetup). If you want to use the example files directly (unlikely), you can copy them elsewhere and make use of them as you see fit.

...

The OIDC "issuer" value needs to be determined, and the OpenID discovery document needs to be made accessiibleaccessible.

The issuer value is set in conf/oidc.properties and must be a URL using the "https" scheme that contains host, and optionally, port number and path components and no query or fragment components. It generally must resolve to the root of the deployment in question. As a result, while it may be the same as one's SAML entityID, it often cannot be, as SAML does not conflate identity and location in this fashion.

...

Code Block
languagexml
<bean id="shibboleth.DefaultRelyingParty" parent="RelyingParty">
	<property name="profileConfigurations">
		<list>
			<ref bean="OIDC.SSO" />
			<ref bean="OIDC.UserInfo"/>
            <ref bean="OAUTH2.Token"/>
			<ref bean="OAUTH2.Revocation"/>
			<ref bean="OAUTH2.Introspection" />
		</list>
	</property>
</bean>

...