Employee Identity (EIAM)

Using IDaaS Authentication Interface's ID Token for Single Sign-On

Integration Solution

# Scenario Description

Applicable to third-party applications authenticating based on IDaaS users. By calling the IDaaS User Login Interface to generate an ID Token, password-free login to various application systems already integrated with IDaaS can be achieved.

# Single Sign-On Process

The user first logs into portal application A, then accesses application B through portal application A to achieve single sign-on.

# Integration Steps

# Create an Application in IDaaS Enterprise Center

  1. Log in to the IDaaS Enterprise Center and create an application.

  2. Enable authentication integration and obtain the application ClientId.

# Configure OIDC Authentication Source in IDaaS Enterprise Center

  1. Log in to the IDaaS Enterprise Center and create an OIDC authentication source.

    Configuration Name Remarks
    Authentication Method Select "Authentication Source Initiated Authentication"
    Public Key Format Select "JSON Format Public Key"
    Public Key Access the link https://{your_domain}/api/v1/oauth2/keys to obtain the RS256 public key, see the image below.
    Signature Algorithm Fixed as "RS256"
    Audience Fill in the application's ClientId
    Callback Address The callback address used to receive the id_token returned by the authentication source, automatically generated after adding.
    Associated Source Attribute The attribute key present after id_token parsing, recommended to fill in the username userName.
    Associated User Attribute The unique attribute of the IDaaS platform user, recommended to select the username userName.

Public Key Acquisition

# Third-Party Platform Calls IDaaS User Login Interface

  1. When logging into the third-party platform, call the User API - Login Interface to obtain the id_token

# Third-Party Platform Calls IDaaS Single Sign-On Interface

  1. Initiate authentication based on the OIDC authentication source, and call the OIDC callback address provided by IDaaS to complete authentication

    Request Description

    • Request Address https://{your_domain}/api/v1/openid/id_token/{idpId}

    • Request Method GET

    • Request Parameters

      Parameter Name Chinese Name Required Type Example
      id_token ID Token Required String
      redirect_to Redirect Address Optional String The access address of the target application system to be accessed
      If the parameter is empty, defaults to redirecting to the IDaaS User Center
      You can configure a whitelist for this address
    • Request Example

      https://{your_domain}/api/v1/openid/id_token/202208231445-0FE9-93C4AFCDA?id_token=eyJhbGciOiJJ9.eyJzdWIiOiJ6aG91eGNoIiwiaWQiOiIyMDIyMTIyMDE1zIjdlIZmFiMDVkNTg3YyJ9.bfCdG5PcttXzoEA8kuOf81SrQ&redirect_to=https://demo.com
      
      1
  • Example Response

    ```http
    HTTP Status: 302 REDIRECT [https://demo.com]
    ```