Configure OAuth2 OpenID Connect (OIDC)#
Colectica Repository can use OpenID Connect for authentication. The inclusion of the email claim is required in the OIDC profile to enable account creation. Follow these instructions to enable OpenID Connect support.
In
PortalDir\appsettings.json, find theOpenIDConnectsection."OpenIDConnect": { "Enabled": "false", "Authority": "", "ClientId": "", "ClientSecret": "", "Audience": "", "NameClaimType": "", "GetClaimsFromUserInfoEndpoint": "true" }
Set the
Enabledproperty totrue.Set the
Authorityproperty to the URL for your OIDC server, such ashttp://localhost:8080/auth/realms/master.Set the
ClientIdandClientSecretfor the client you have configured on your OIDC authority.For JWT, Set the
Audiencewhich should be used, or leave blank.To manage which OIDC users and groups map to the different Colectica roles, see Users in the Colectica Portal documentation.