SECURING
A Single Sign-On (SSO) option for browser clients is available using the Open ID Connect (OIDC) authorization code flow with PKCE.
Domino's OIDC login SSO functionality allows browser clients to access the Domino web server by authenticating with an OIDC provider. This form of SSO serves a similar role to basic SAML authentication for Web servers. In Domino 12.0.2 this functionality cannot be used to authenticate against the Notes ID vault to acquire an ID file, so does not serve as a replacement for Web Federated Login, Notes Federated Login, or Nomad Federated Login. After authenticating against a trusted OIDC provider, the user's web browser will receive a session cookie that is used to authenticate subsequent HTTP requests to that Domino server.
Procedure
1. Configure HTTP bearer authentication for one or more Internet Sites as discussed in Enabling HTTP Bearer authentication.
3. Enable Session authentication from the Domino Web Enginestab of the Internet Site document.
a. Set the client_id configured at the OIDC provider in the OIDC_LOGIN_CLIENT_ID notes.ini.
b. Set the client_secret configured at the OIDC provider in the OIDC_LOGIN_CLIENT_SECRET notes.ini.
Other configuration settings
By default, the cookies used to maintain OIDC authentication state have a lifetime of 2 minutes in EAP5. This default can be changed by setting the OIDC_LOGIN_COOKIE_DURATION_SEC notes.ini to a value between 30 and 900 seconds to force end users to authenticate with their OIDC provider more quickly or to give them more time.
In addition to the notes.ini variables discussed in the HTTP Bearer authentication documentation, two notes.ini variables can be used to enable additional tracing on the server console:
Sample KeyCloak configuration as an OIDC provider for Domino This sample configuration corresponds to a Domino Internet Site listening on https://ultraviolet.example.com.
Related tasks Configuring basic SAML authentication for Web servers