To establish a trust relationship between an enterprise IdP and the cloud platform, set the user redirect URLs and create OAuth 2.0 credentials in the enterprise IdP. On the IAM console, create an IdP entity and configure authorization information.
Create an IdP entity and configure authorization information in IAM to establish a trust relationship between the enterprise IdP and IAM
The IdP name must be unique under your account. You are advised to use the domain name.
Parameter |
Description |
---|---|
Identity Provider URL |
URL of the OpenID Connect IdP. Set it to the value of issuer in the Openid-configuration. NOTE:
Openid-configuration indicates a URL defined in OpenID Connect, containing configurations of an enterprise IdP. The URL format is https://{base URL}/.well-known/openid-configuration, where base URL is defined by the enterprise IdP. For example, the Openid-configuration of Google is https://accounts.google.com/.well-known/openid-configuration. |
Client ID |
ID of a client registered with the OpenID Connect IdP. The client ID is an OAuth 2.0 credential created in the enterprise IdP. |
Authorization Endpoint |
Authorization endpoint of the OpenID Connect IdP. Set it to the value of authorization_endpoint in Openid-configuration. This parameter is required only if you set Access Type to Programmatic access and management console access. |
Scopes |
Scopes of authorization requests. openid is selected by default. This parameter is required only if you set Access Type to Programmatic access and management console access. Enumerated values:
|
Response Type |
Response type of authorization requests. The default value is id_token. This parameter is required only if you set Access Type to Programmatic access and management console access. |
Response Mode |
Response mode of authorization requests. The options include form_post and fragment. form_post is recommended. This parameter is required only if you set Access Type to Programmatic access and management console access. |
Signing Key |
Public key used to sign the ID token of the OpenID Connect IdP. For account security purposes, change the signing key periodically. |
Federated users can only access the cloud platform by default. To assign permissions to federated users, configure identity conversion rules for the IdP. For details, see Step 2: Configure Identity Conversion Rules.
To modify the configuration of an IdP, click Modify at the bottom of the details page.