To establish a trust relationship between an enterprise identity provider and the cloud system, create an identity provider and configure authorization information on the IAM console, and set the user redirect URLs and create OAuth 2.0 credentials in the enterprise identity provider.
As an enterprise administrator, you have registered an account in the cloud system and created user groups and granted them permissions in IAM.
The user groups created in IAM will be used to assign permissions to identity provider users mapped to the cloud system.
https://auth.otc.t-systems.com/authui/oidc/redirect and https://auth.otc.t-systems.com/authui/oidc/post
Create an identity provider and configure authorization information in IAM.
The identity provider name must be unique under your account.
Parameter |
Description |
---|---|
Identity Provider URL |
URL of the OpenID Connect identity provider. Specify this parameter as the value of issuer in the Openid-configuration. NOTE:
Openid-configuration indicates a URL defined in OpenID Connect, containing configurations of an enterprise identity provider. The URL format is https://{base URL}/.well-known/openid-configuration, where base URL is defined by the enterprise identity provider. For example, the Openid-configuration of Google is https://accounts.google.com/.well-known/openid-configuration. Therefore, the identity provider URL is https://accounts.google.com. |
Client ID |
ID of a client registered with the OpenID Connect identity provider. that is, an OAuth 2.0 credential created in the enterprise identity provider. |
Authorization Endpoint |
Authorization endpoint of the OpenID Connect identity provider. Specify this parameter as the value of authorization_endpoint in the Openid-configuration. This parameter is required only if you set Access Type to Programmatic access and management console access. |
Scopes |
Scopes of authorization requests. openid is selected by default. This parameter is required only if you set Access Type to Programmatic access and management console access. Enumerated values:
|
Response Type |
Response type of authorization requests. The default value is id_token. This parameter is required only if you set Access Type to Programmatic access and management console access. |
Response Mode |
Response mode of authorization requests. The options include form_post and fragment. form_post is recommended.
This parameter is required only if you set Access Type to Programmatic access and management console access. |
Signing Key |
Public key used to sign the ID token of the OpenID Connect identity provider. For example: NqMhxWVZf2PcPQRc6aBlpd3k... NOTE:
For account security purposes, change the signing key periodically. |
Federated users only have read permissions for the cloud system by default. To assign permissions to federated users, configure identity conversion rules for the identity provider. For more information, see Step 2: Configure Identity Conversion Rules.
To modify the configurations of an identity provider, click Modify at the bottom of the details page.