Skip to content

OpenID Connect Authentication

OpenID Connect Authentication Flow

The procedure for linking OpenID Connect authentication with the WebPerformer-NX application is as follows

  1. Click the [SP Authentication] icon at the top of the User Manager screen.
  2. Select [OpenID].
  3. Confirm the single sign-on URL and set it to the external IdP.
Setup for OktaSetup for Azure AD
Single Sign on URLEnglish:Single Sign on URL
Japanese:シングルサインオン URL
English:Redirect URI
Japanese:リダイレクト URI
  1. Verify the information required to register an identity provider with an external IdP.
    • For Azure AD
    1. Application ID (client ID) of the registered application
    2. Issuer URL (e.g., [https://login.microsoftonline.com//v2.0])
    3. Issue the client secret and obtain the value of the client secret
    • For Okta
    1. Client ID of the registered application
    2. Okta URL (e.g., [https://oktaice.okta.com])
    3. Get the secret value of the client secret.
  2. Register an identity provider.
  3. Place a button from the component list as a button for external authentication on the sign-in screen (Sign In ID) of the authentication UI.
  4. Open the properties screen of the button for external authentication placed in step 6, and set the following.
    • Select “IdP” from the click event.
    • Enter the name of the identity provider registered in step 5 in the “IdP” field.
  5. Save the sign-in screen (Sign In ID) of the authentication UI.

Identity Provider Registration

  1. Click the [Create] icon in the upper right corner of the screen.
  2. Select OpenID.
  3. Enter the Identity Provider information.
ItemInputDescription
Identity Provider NameRequiredArbitrary names must be other than single-byte spaces, underscores, and commas.
The maximum number of characters is 32.
Client IDRequiredThis is the value of OpenID Connect Authentication Linkage Procedure 4 - 1.
Client SecretRequired The value of the OpenID Connect authentication linkage procedure 4 - 2.
Issuer URLRequiredThe value of the OpenID Connect authentication linkage procedure 4 - 3.
Attribute Mapping RequiredSet up a mapping between user attributes and OIDC attributes.
User attributeOIDC attributeRequired
Email(Enter OIDC attribute name)
Name(Enter OIDC attribute name)
custom:custom_01(Enter OIDC attribute name)
custom:custom_02(Enter OIDC attribute name)
custom:custom_03(Enter OIDC attribute name)
custom:custom_04(Enter OIDC attribute name)
custom:custom_05(Enter OIDC attribute name)
custom:custom_06(Enter OIDC attribute name)
custom:custom_07(Enter OIDC attribute name)
custom:custom_08(Enter OIDC attribute name)
custom:custom_09(Enter OIDC attribute name)
custom:custom_10(Enter OIDC attribute name)


Be sure to map the OIDC attribute mapping to the user attribute [email] to the attribute for which email information is registered.
  1. Click the "Add" button.
  2. The added identity provider will appear in the IdP list.