Joget DX 8 Stable Released
The stable release for Joget DX 8 is now available, with a focus on UX and Governance.
Table of Contents |
---|
Open ID OpenID Directory Manager plugin enables the use of OpenID Connect to authenticate users to sign in to Joget.
Figure 1: Login screen with an additional sign-in button using Open ID OpenID Directory Manager plugin
Upon clicking on the login button, users will be redirected to the configured OpenID Connect site where they will log in. When a user is authenticated, it will then redirect back to Joget using the "Callback URL" configured in the OpenIDplugin.
This plugin requires the use of Joget Professional edition and above.
This plugin source code is available in a new open source repository at https://github.com/jogetoss/openid-connect-authentication.
JogetOSS is a community-led team for open source software related to the Joget no-code/low-code application platform. Projects under JogetOSS are community-driven and community-supported, and you are welcome to contribute to the projects.
...
...
Attribute | Description | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Callback URL | URL to which Auth0 redirects users after they authenticate. Ensure to provide this Callback URL to your Open ID OpenID Connect service. | |||||||||||
Issuer |
| |||||||||||
Issuer URL | URL which is used to validate the discovery URL (Issuer URL + "/.well-known/openid-configuration") URL where Auth0 can find the OpenID Provider Configuration Document, which should be available in the | |||||||||||
Authorization Token Endpoint | Authorization server's authorization endpoint, which you can retrieve using the server's Metadata URI (Issuer URL + "/.well-known/openid-configuration").
| |||||||||||
Token Endpoint | The endpoint on the Authorization Server is used to programmatically request tokens, which you can retrieve using the server's Metadata URI (Issuer URL + "/.well-known/openid-configuration").
| |||||||||||
User Info Endpoint | User Profile Information, which you can retrieve using the server's Metadata URI (Issuer URL + "/.well-known/openid-configuration").
| |||||||||||
Json Web Key Set | Issued by the authorization server and signed using the RS256 signing algorithm
| |||||||||||
Response Types Supported | By default, code | |||||||||||
Client ID | The Client ID provisioned by the OpenID provider when the client was registered | |||||||||||
Client Secret | The Client Secret (password) provisioned by the OpenID provider when the client was registered | |||||||||||
Scope | A list of Auth0 scopes to request when connecting to the Identify Provider. By default, | openid openid profile email | ||||||||||
User Provisioning Enabled | If enabled, ensures the user account is created in Joget's User Directory |
...
Save Access Token And Refresh Token To User Meta? | If enabled, saves access token and refresh token (if available, may need to include offline_access in Scope) to user meta: oidcAccessToken and oidcRefreshToken Tokens can be accessible with User Meta Hash Variable
Access token can also be refreshed with a Hash Variable #oidc.refreshAccessToken# which will attempt to get a new set of tokens with refresh token if the current access token has expired. |
Attribute | Description | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Login Button Text | Login button styling text
| |||||||||||
Login Button Icon | Login button styling icon class
| |||||||||||
Button Text Color | Login button styling button text color
| |||||||||||
Button Background Color | Login button styling button background-color
|
Attribute / Provider | OKTA | OKTA | Microsoft Azure AD | Auth0 | |
---|---|---|---|---|---|
Issuer | Issuer URL | Custom | Issuer URL | Custom | Issuer URL |
Issuer URL | https://dev-sample123.okta.com | https://dev-sample123.okta.com | https://accounts.google.com | https://login.microsoftonline.com/tenantIDSampleValue/v2.0 | Before June 2020, there was no ".us" country in the URL: https://dev-sample123.auth0.com Now: https://dev-sample123.us.auth0.com |
Authorization Token Endpoint | https://dev-sample123.okta.com/oauth2/v1/authorize | https://login.microsoftonline.com/tenantIDSampleValue/oauth2/v2.0/authorize | |||
Token Endpoint | https://dev-sample123.okta.com/oauth2/v1/token | https://login.microsoftonline.com/tenantIDSampleValue/oauth2/v2.0/token | |||
User Info Endpoint | https://dev-sample123.okta.com/oauth2/v1/ |
userinfo | https://graph.microsoft.com/oidc/userinfo | ||||
Json Web Key Set | https://dev-sample123.okta.com/oauth2/v1/keys | https://login.microsoftonline.com/tenantIDSampleValue /discovery/v2.0/keys | |||
Responses Types Supported | code | code | code | code | code |
Client ID | clientIDSampleValue | clientIDSampleValue | clientIDSampleValue | clientIDSampleValue | clientIDSampleValue |
Client Secret | clientSecretSampleValue | clientSecretSampleValue | clientSecretSampleValue | clientSecretSampleValue | clientSecretSampleValue |
Scope | openid profile email | openid profile email | openid email | openid profile email | openid profile email |
Documentation Link | https://developer.okta.com/docs/reference/api/oidc/ | https://developer.okta.com/docs/reference/api/oidc/ | https://developers.google.com/identity/protocols/oauth2/openid-connect | https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app To obtain all the URL paths, from your Azure App, go to Overview > Endpoints, look for "OpenID Connect metadata document" and open the URL to obtain all the paths. | Connect to OpenID Connect Identity Provider (auth0.com) |
7.0.3
...
[ MODIFIED ] : Redirect back to referrer after login.
[ FIXED ] : Fix nonce issue.
7.0.2
[ FIXED ] : Fix Forgot password not displaying on login when enabled.
7.0.1
[ FIXED ] : 404 error on first login by local user after enabling the plugin.
[ FIXED ] : Incorrect SSO URL.
[ MODIFIED ] : Added default values to login button.
7.0.0
[ ADDED ] : Initial Release.