Skip to main content

Creating the OIDC Application

Follow these steps to create an OpenID Connect integration in your IDaaS account.

  1. Navigate to the Applications page.

  2. Create a new application by clicking the + button on the top left.

  3. Scroll down until you reach the category OpenID Connect and OAuth Cloud Integrations. Select Generic SPA Application.

  4. Complete the fields on the General page then click Next.

  5. On the Setup step, use the default settings unless mentioned below:

    1. Copy the Client ID. You will need this later.
    2. Set the Subject ID Attribute to the attribute that will be used to uniquely identify each user.
    3. Add the allowed Login Redirect URI(s) you want your application to route to after login.
    4. Add the allowed Logout Redirect URI(s) you want your application to route to after logout. This is optional.
    tip

    You may want to add localhost during testing and development in order to test your OIDC configuration. Remember to remove this value when going to production!

    1. For Grant Types Supported, check Authorization Code. If you plan on using Refresh Tokens check Refresh Token (OIDC).
    2. Under Supported Scopes you may select the scopes that will be requested during authentication.
    3. Under Supported Claims you may configure the claims that will be returned in the Access and/or ID Tokens. This includes claims implied by the selected scopes.
    4. Click Submit.
  6. On the Complete page, click the Add Resource Rule button.

  7. You will be redirected to Add Resource Rules. Here you can set a name and description. Click Next.

  8. Configure the Authentication Flow you want your users to use when logging in to your application. Click Submit. At this point you will have completed all the configuration needed in IDaaS. You are now ready to move on to Protecting your Single Page Application.

tip

If you plan on requesting access tokens for specific audiences see Configuring Resource Audience.