Example: Configuring Entrust Identity as a Service
The following example shows how to configure Entrust Identity as a Service (IDaaS) to use with KeyControl for External Authentication using Open ID Connect.
-
Log into Entrust IDaaS with your user name and one time password (OTP).
-
After you have logged in, click Applications.
-
Click the + icon to create a new Generic OpenID Connect and OAuth Cloud Integration.
-
Create a Generic Web Application using the following:
-
General Settings:
-
Copy and paste the Client ID and the Client Secret to a safe location. These will be used when configuring OIDC in Entrust CloudControl.
-
Set the Token / Revocation Endpoint Client Authentication Method to Client Secret Post.
-
Set the Login Redirect URIs for all nodes in the cluster to:
https://<IP or FQDN of KeyControl node>/v5/oidc/callback
-
Set the Logout Redirect URIs for all nodes in the cluster to:
https://<IP or FQDN of KeyControl node>/v5/kc/oidc/logout
-
-
Authentication Settings:
-
Check the Require Consent checkbox.
-
Under Grant Types Supported, check the Authorization Code checkbox.
-
-
Supported Scopes
-
Select the Your unique identifier checkbox.
-
Select the Email address checkbox.
-
Use the default for all other settings.
-
-
Add a resource rule to the AD Group so that the AD group and users from that AD group can access the application.