OIDC Provider Setup
This topic describes how to set up and pair two common identity providers with the OIDC configuration in Workbench. Each process switches between the identity provider and the Workbench interface at times, and requires a previously configured account with the identity provider.
-
Sign into the Azure Portal.
-
Click the menu icon to open the Azure Services sidebar.
-
Click Azure Active Directory.
-
On the sidebar, under Manage, click App registrations.
-
Click + New Registration and define the new app:
-
Enter a name in the Name box.
-
On the Supported account types list, select the account type.
-
Enter the following values in the Redirect URI section:
-
Type—Public client/native (mobile & desktop)
-
URL—http://127.0.0.1/oauth2reply/oidc
-
-
Click Register.
The new app registration is created and you are redirected to the home page of the app registration.
-
-
In Workbench, open a connection with the DiveLine in which you are configuring OIDC.
-
Click Tools > Server Settings.
-
Expand the OpenID Connect Settings chevron.
-
Click Edit OIDC Identity Providers.
The Edit OIDC Providers window opens.
-
Click the plus icon .
A new Identity Provider row is created.
-
Copy the Application (client id) from the Azure app registration and paste it in the Client ID column in the new row.
-
Click Endpoints.
The Endpoints panel opens.
-
Copy the portion of the OpenID Connect metadata document URL from https through /v.20. For example, https://login.microsoftonline.com/[Directory ID]/v2.0.
-
On the sidebar, under Manage, click Authentication.
The Platform Configurations page opens.
-
Click + Add a Platform.
The Configure Platforms window opens.
-
Click Single-page application.
The Configure single-page application window opens.
-
Enter a redirect URI following this pattern: https://HOSTNAME/DIVEPORTNAME/ . For example, https://diver.example.com/diveport/. The trailing slash is required.
-
Click Configure.
NOTE: If you have additional web applications, click Add URI in the Single-page Application section and follow the same URI pattern for each additional web application.
-
In the Mobile and desktop applications section, click Add URI three times.
-
Enter the following values in the new URI boxes:
-
http://127.0.0.1/oauth2reply/oidc
-
com.dimins.gateway://oauth2reply/oidc
-
com.dimins.dimobile://oauth2reply/oidc
-
-
Click Save.
-
On the main Directory page, under the Manage section of the side bar, click Enterprise Applications.
The All applications page opens.
-
Select your new application from the list of applications.
The Overview page opens.
-
On the sidebar, under Security,click Permissions.
-
Click Grant admin consent.
-
Go to Google Cloud.
-
Click Select a project in the upper left banner.
If no project exists, click New Project to create a project.
-
On the sidebar, under APIs & Services,click Credentials.
The Credentials page opens.
-
Click Create Credentials.
-
Click OAuth client id.
-
On the Application type list, select Web application.
-
On the Authorized redirect URIs section, click + Add URI for each of the following values that you want to redirect to:
-
http://127.0.0.1/oauth2reply/oidc
-
com.dimins.dimobile://oauth2reply/oidc
-
com.dimins.gateway://oauth2reply/oidc
-
com.dimins.programadvisor://oauth2reply/oidc if using Program Advisor
NOTE: For all other web applications, follow the pattern of https://[Host Name]/[DivePort Name]/. For example: https://diver.example.com/diveport/. The trailing slash is required.
-
-
Click Create.
Your web application is created.
-
Click the name of your web application on the OAuth 2.0 Client IDs list.
Your application window opens, with client information on the right side. You will use this information to configure Workbench OIDC.
-
In Workbench, open a connection with the DiveLine in which you are configuring OIDC.
-
Click Tools > Server Settings.
-
Expand the OpenID Connect Settings chevron.
-
Click Edit OIDC Identity Providers.
The Edit OIDC Providers window opens.
-
Click the plus icon .
A new Identity Provider row is created.
-
In the Issuer field, enter https://accounts.GOOGLE.com.
-
On the Google Cloud application window that you opened in step 9, copy the Client ID and paste the value in the Client ID box.
-
On the Edit OIDC Providers window, click Advanced.
The OIDC Advanced Options window opens.
-
On the Google Cloud application window that you opened in step 9, copy the Client Secret and paste the value in the Client secret box.