SECURING


Configuring OIDC-based SSO for web users

A Single Sign-On (SSO) option for browser clients is available using the Open ID Connect (OIDC) authorization code flow with PKCE.

Domino's OIDC login SSO functionality allows browser clients to access the Domino web server by authenticating with an OIDC provider. This form of SSO serves a similar role to basic SAML authentication for Web servers. In Domino 12.0.2 this functionality cannot be used to authenticate against the Notes ID vault to acquire an ID file, so does not serve as a replacement for Web Federated Login, Notes Federated Login, or Nomad Federated Login. After authenticating against a trusted OIDC provider, the user's web browser will receive a session cookie that is used to authenticate subsequent HTTP requests to that Domino server.

Procedure

1. Configure HTTP bearer authentication for one or more Internet Sites as discussed in Enabling HTTP Bearer authentication.


2. Configure a trusted OIDC provider for one or more of those Internet Sites as shown in Configuring trusted OIDC providers

3. Enable Session authentication from the Domino Web Enginestab of the Internet Site document.


4. Configure a new OIDC/OAuth 2.0 client for this internet site in your OIDC provider. We recommend configuring Domino as a "confidential client," only enabling the authorization code flow and requiring PKCE with S256. The redirect URI for a Domino server listening on myserver.example.com will be in the form ofhttps://myserver.example.com/names.nsf?OIDCLogin. Note that OIDC login can be enabled on multiple internet sites by selecting all of those internet sites in the OIDC Provider document in idpcat.nsf and configuring redirect URIs for each of those host names in your OIDC provider. 6. Set OIDC_LOGIN_ENABLE_REDIRECT=1 to enable redirection of unauthenticated users from endpoints on the Domino server to the /names.nsf?OIDCLogin endpoint and back again to their original target URI after authentication.

Other configuration settings

By default, the cookies used to maintain OIDC authentication state have a lifetime of 2 minutes in EAP5. This default can be changed by setting the OIDC_LOGIN_COOKIE_DURATION_SEC notes.ini to a value between 30 and 900 seconds to force end users to authenticate with their OIDC provider more quickly or to give them more time.

In addition to the notes.ini variables discussed in the HTTP Bearer authentication documentation, two notes.ini variables can be used to enable additional tracing on the server console:


Limitations, known issues, and notes
Parent topic: Using OpenID Connect (OIDC) to configure federated-identity authentication

Related tasks
Configuring basic SAML authentication for Web servers