Joget DX 8 Stable Released
The stable release for Joget DX 8 is now available, with a focus on UX and Governance.
Open ID Directory Manager enables the use of OpenID Connect to authenticate users to sign in to Joget.
Figure 1: Login screen with an additional sign-in button using Open ID Directory Manager
Upon clicking on the login button, users will be redirected to the configured OpenID site where they will log in. When a user is authenticated, it will then redirect back to Joget using the "Callback URL" configured in the OpenID.
This plugin requires the use of Joget Professional and above.
Attribute | Description |
---|---|
Callback URL | URL to which Auth0 redirects users after they authenticate. Ensure to provide this Callback URL to your Open ID service. |
Issuer |
|
Issuer URL | URL which is used to validate the discovery URL (Issuer URL + "/.well-known/openid-configuration") URL where Auth0 can find the OpenID Provider Configuration Document, which should be available in the |
Authorization Token Endpoint | Authorization server's authorization endpoint, which you can retrieve using the server's Metadata URI (Issuer URL + "/.well-known/openid-configuration"). Sample Format https://${Issuer URL}/oauth2/${authServerId}/v1/authorize |
Token Endpoint | The endpoint on the Authorization Server is used to programmatically request tokens, which you can retrieve using the server's Metadata URI (Issuer URL + "/.well-known/openid-configuration"). Sample Format https://${Issuer URL}/oauth2/${authServerId}/v1/token |
User Info Endpoint | User Profile Information, which you can retrieve using the server's Metadata URI (Issuer URL + "/.well-known/openid-configuration"). Sample Format https://${Issuer URL}/oauth2/${authServerId}/v1/userinfo |
Json Web Key Set | Issued by the authorization server and signed using the RS256 signing algorithm Sample Format https://${Issuer URL}/oauth2/${authServerId}/v1/keys |
Response Types Supported | By default, code |
Client ID | The Client ID provisioned by the OpenID provider when the client was registered |
Client Secret | The Client Secret (password) provisioned by the OpenID provider when the client was registered |
Scope | A list of Auth0 scopes to request when connecting to the Identify Provider. By default, openid profile email |
User Provisioning Enabled | If enabled, ensures the user account is created in Joget's User Directory |
Attribute | Description |
---|---|
Login Button Text | Login button styling text Sample Value Login |
Login Button Icon | Login button styling icon class Sample Value fas fa-arrow-right |
Button Text Color | Login button styling button text color Sample Value white |
Button Background Color | Login button styling button background-color Sample Value black |
Attribute / Provider | OKTA | OKTA | Microsoft Azure AD | |
---|---|---|---|---|
Issuer | Issuer URL | Custom | Issuer URL | Custom |
Issuer URL | https://dev-sample123.okta.com | https://dev-sample123.okta.com | https://accounts.google.com | https://login.microsoftonline.com/tenantIDSampleValue/v2.0 |
Authorization Token Endpoint | https://dev-sample123.okta.com/oauth2/v1/authorize | https://login.microsoftonline.com/tenantIDSampleValue/oauth2/v2.0/authorize | ||
Token Endpoint | https://dev-sample123.okta.com/oauth2/v1/token | https://login.microsoftonline.com/tenantIDSampleValue/oauth2/v2.0/token | ||
User Info Endpoint | https://dev-sample123.okta.com/oauth2/v1userinfo | https://graph.microsoft.com/oidc/userinfo | ||
Json Web Key Set | https://dev-sample123.okta.com/oauth2/v1/keys | https://login.microsoftonline.com/tenantIDSampleValue/discovery/v2.0/keys | ||
Responses Types Supported | code | code | code | code |
Client ID | clientIDSampleValue | clientIDSampleValue | clientIDSampleValue | clientIDSampleValue |
Client Secret | clientSecretSampleValue | clientSecretSampleValue | clientSecretSampleValue | clientSecretSampleValue |
Scope | openid profile email | openid profile email | openid email | openid profile email |
Documentation Link | https://developer.okta.com/docs/reference/api/oidc/ | https://developer.okta.com/docs/reference/api/oidc/ | https://developers.google.com/identity/protocols/oauth2/openid-connect | https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-protocols-oidc https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app To obtain all the URL paths, from your Azure App, go to Overview > Endpoints, look for "OpenID Connect metadata document" and open the URL to obtain all the paths. |