TSP_OIDC_BlueID.xml 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109
  1. <!-- MANDATORY: Defines a group of properties that allows the product to use an OpenID
  2. Connect identity provider for user authentication. -->
  3. <!-- Set the values for this group of properties to allow the product access to your existing
  4. OpenID Connect identity provider. This external resource must already exist in your
  5. environment and be configured to use for authentication. -->
  6. <crn:instance name="MANDATORY" class="TSP_OIDC_BlueID">
  7. <!-- identityProviderType: Specifies the implementation of an OpenID Connect identity
  8. provider. -->
  9. <crn:parameter name="identityProviderType">
  10. <crn:value xsi:type="xsd:string">IBMid</crn:value>
  11. </crn:parameter>
  12. <!-- id: Specifies a unique identifier for the authentication namespace. -->
  13. <!-- Use the namespace identifier to distinguish between multiple namespaces. Each namespace
  14. must have a unique identifier. When you select a namespace to use for authentication
  15. in the run-time environment, the identifier is used by the IBM Cognos components.
  16. Changing the namespace ID after the service has been started may invalidate the object
  17. security policies and the Cognos group and role memberships. The use of the colon
  18. in the Namespace ID is not supported. -->
  19. <crn:parameter name="id">
  20. <crn:value xsi:type="xsd:string">MANDATORY</crn:value>
  21. </crn:parameter>
  22. <!-- issuer: Specifies the OpenID claim issuer. -->
  23. <!-- A string that represents the identity provider that issued the claims in the ID token.
  24. This value must match the value of the 'iss' entry in the ID token JSON document. -->
  25. <crn:parameter name="issuer">
  26. <crn:value xsi:type="xsd:string">https://idaas.iam.ibm.com</crn:value>
  27. </crn:parameter>
  28. <!-- oidcTokenEndpoint: Specifies the OpenID Connect token endpoint -->
  29. <!-- The token endpoint is used to retrieve the identity token after a successful authentication
  30. to the OpenID Connect identity provider. -->
  31. <crn:parameter name="oidcTokenEndpoint">
  32. <crn:value xsi:type="cfg:anyPathURI">https://idaas.iam.ibm.com:443/idaas/oidc/endpoint/default/token</crn:value>
  33. </crn:parameter>
  34. <!-- oidcAuthEndpoint: Specifies the OpenID Connect authorization endpoint. -->
  35. <!-- The authorization endpoint is a URL that your OpenID Connect identity provider uses
  36. for authentication. In most cases, the URL should use the https scheme. The authorization
  37. endpoint is invoked when users authenticate to the OpenID Connect identity provider. -->
  38. <crn:parameter name="oidcAuthEndpoint">
  39. <crn:value xsi:type="cfg:anyPathURI">https://idaas.iam.ibm.com:443/idaas/oidc/endpoint/default/authorize</crn:value>
  40. </crn:parameter>
  41. <!-- clientId: Specifies the OpenID Connect client identifier -->
  42. <!-- The client identity that is assigned to the application by the OpenID Connect identity
  43. provider. -->
  44. <crn:parameter name="clientId">
  45. <crn:value xsi:type="xsd:string">MANDATORY</crn:value>
  46. </crn:parameter>
  47. <!-- clientSecret: Specifies the client secret that is assigned to the application by
  48. the OpenID Connect identity provider. -->
  49. <!-- The client secret that is assigned to the application by the OpenID Connect identity
  50. provider. -->
  51. <crn:parameter name="clientSecret">
  52. <crn:value xsi:type="xsd:string" encrypted="true"></crn:value>
  53. </crn:parameter>
  54. <!-- idpCertificateFile: Specifies the location of the certificate that is used by the
  55. OpenID Connect identity provider to sign the identity token. -->
  56. <!-- A path to the file that contains the certificate used by the identity provider to
  57. sign the JSON Web Token. The path must include the certificate file name and be accessible
  58. to the running instance of Cognos Analytics. The certificate must be in a PEM format,
  59. include only the public key certificate, and include the begin and end certificate
  60. lines. The certificate file cannot be placed in the configuration/certs directory. -->
  61. <crn:parameter name="idpCertificateFile">
  62. <crn:value xsi:type="cfg:filePath"></crn:value>
  63. </crn:parameter>
  64. <!-- returnUrl: Return URL that is configured with the OpenID Connect identity provider. -->
  65. <!-- The return URL is invoked by the OpenID Connect identity provider after successfully
  66. authenticating a user. The URL format is https://dispatcherHOST:dispatcherPORT/bi/completeAuth.jsp
  67. or https://webserverHOST:webserverPORT/ibmcognos/bi/completeAuth.jsp. This URL completes
  68. Cognos Analytics authentication using the OpenID Connect identity provider. -->
  69. <crn:parameter name="returnUrl">
  70. <crn:value xsi:type="cfg:anyPathURI">https://host:443/bi/completeAuth.jsp</crn:value>
  71. </crn:parameter>
  72. <!-- selectableForAuth: Specifies whether the namespace is selectable for authentication. -->
  73. <!-- If this property is set to true, the namespace will be available for authentication
  74. in the logon page namespace selection prompt. Set this value to false if the namespace
  75. should not be available for selection on the logon page. -->
  76. <crn:parameter name="selectableForAuth">
  77. <crn:value xsi:type="xsd:boolean">true</crn:value>
  78. </crn:parameter>
  79. <!-- advancedProperties: Specifies a set of advanced properties. -->
  80. <!-- The user needs to provide the name and the value for each advanced property. -->
  81. <crn:parameter name="advancedProperties" opaque="true">
  82. <crn:value xsi:type="cfg:array"/>
  83. </crn:parameter>
  84. <!-- claimName: Specifies the name of the claim that will be provided to the target namespace. -->
  85. <!-- A string that represents the name of the claim from the id_token that will be provided
  86. to the target namespace. This value must be a single string value in the id_token
  87. and must exist for all account objects. -->
  88. <crn:parameter name="claimName">
  89. <crn:value xsi:type="xsd:string">MANDATORY</crn:value>
  90. </crn:parameter>
  91. <!-- trustedEnvName: Specifies the environment variable name that will be used to transfer
  92. the claim to the target namespace. -->
  93. <!-- A string that represents the environment variable name that will be used to transfer
  94. the claim to the target namespace. This value is dependent on the target namespace
  95. type and corresponds to how the target namespace will obtain the user's identity.
  96. For example, the LDAP and Active Directory namespace types both expect the user's
  97. identity to be passed in the REMOTE_USER environment variable. -->
  98. <crn:parameter name="trustedEnvName">
  99. <crn:value xsi:type="xsd:string">REMOTE_USER</crn:value>
  100. </crn:parameter>
  101. <!-- redirectNsID: Specifies the namespace ID that will be invoked with the claim obtained
  102. from the OpenID identity provider. -->
  103. <!-- A string that represents the ID of the namespace that will be invoked with the claim
  104. obtained from the OpenID identity provider. This value must match the namespace ID
  105. of a configured namespace (e.g., LDAP, AD, etc). -->
  106. <crn:parameter name="redirectNsID">
  107. <crn:value xsi:type="xsd:string">MANDATORY</crn:value>
  108. </crn:parameter>
  109. </crn:instance>