-
-
Notifications
You must be signed in to change notification settings - Fork 14
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #1067 from ITfoxtec/test
Test
- Loading branch information
Showing
125 changed files
with
1,727 additions
and
386 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,14 +1,14 @@ | ||
# Connect Microsoft Entra ID as authentication method | ||
# Connect Microsoft Entra ID with OpenID Connect | ||
|
||
FoxIDs can be connected to Microsoft Entra ID (Azure AD) with OpenID Connect and thereby authenticating end users in a Microsoft Entra ID tenant. | ||
|
||
It is possible to connect both a [single tenant](#configure-single-tenant) and [multitenant](#configure-multitenant) Microsoft Entra ID App as an authentication method on FoxIDs using OpenID Connect. | ||
A more complex case is to [read claims form the access token](#read-claims-from-access-token). | ||
If you configure [App roles](#app-roles) they are returned in the `roles` claim. | ||
|
||
> You can test the Microsoft Entra ID login with the [online web app sample](https://aspnetcoreoidcallupsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Microsoft Entra ID`. | ||
> You can test the Microsoft Entra ID login with the [online web app sample](https://aspnetoidcsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Microsoft Entra ID`. | ||
> Take a look at the Microsoft Entra ID sample configuration in FoxIDs Control: [https://control.foxids.com/test-corp](https://control.foxids.com/test-corp) | ||
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication methods` tab. | ||
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication` tab. | ||
## Configure single tenant | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,18 +1,18 @@ | ||
# Connect Facebook as authentication method | ||
# Connect Facebook with OpenID Connect | ||
|
||
FoxIDs can be connected to Facebook with OpenID Connect and authenticate users with Facebook login or Facebook Limited login. | ||
|
||
> You can test the Facebook login with the [online web app sample](https://aspnetcoreoidcallupsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Facebook`. | ||
> You can test the Facebook login with the [online web app sample](https://aspnetoidcsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Facebook`. | ||
> Take a look at the Facebook sample configuration in FoxIDs Control: [https://control.foxids.com/test-corp](https://control.foxids.com/test-corp) | ||
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication methods` tab. | ||
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication` tab. | ||
## Configure Facebook | ||
|
||
This chapter describes how to configure a connection with OpenID Connect Authorization Code flow and read the users claims from the ID token. | ||
|
||
**1 - Start by creating an OpenID Connect authentication method in [FoxIDs Control Client](control.md#foxids-control-client)** | ||
|
||
1. Navigate to the **Authentication Methods** tab | ||
1. Navigate to the **Authentication** tab | ||
2. Click **New authentication** | ||
3. Select **OpenID Provider** | ||
4. Add the **Name** e.g. Facebook | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,18 +1,18 @@ | ||
# Connect Google as authentication method | ||
# Connect Google with OpenID Connect | ||
|
||
FoxIDs can be connected to Google with OpenID Connect and authenticate users with Google login. | ||
|
||
> You can test the Google login with the [online web app sample](https://aspnetcoreoidcallupsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Google`. | ||
> You can test the Google login with the [online web app sample](https://aspnetoidcsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Google`. | ||
> Take a look at the Google sample configuration in FoxIDs Control: [https://control.foxids.com/test-corp](https://control.foxids.com/test-corp) | ||
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication methods` tab. | ||
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication` tab. | ||
## Configure Google | ||
|
||
This chapter describes how to configure a connection with OpenID Connect Authorization Code flow + PKCE and read the users claims from the ID token. | ||
|
||
**1 - Start by creating an OpenID Connect authentication method in [FoxIDs Control Client](control.md#foxids-control-client)** | ||
|
||
1. Navigate to the **Authentication Methods** tab | ||
1. Navigate to the **Authentication** tab | ||
2. Click **New authentication** | ||
3. Select **OpenID Provider** | ||
4. Add the **Name** e.g. Google | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,4 @@ | ||
# Connect IdentityServer as authentication method | ||
# Connect IdentityServer with OpenID Connect | ||
|
||
FoxIDs can be connected to an IdentityServer with OpenID Connect and thereby authenticating end users in an IdentityServer. | ||
|
||
|
@@ -9,7 +9,7 @@ It is possible to connect an [IdentityServer client](#configure-identityserver-c | |
> The `IdentityServerOidcOpSample` sample is configured with Implicit Flow to enable local testing, please use Authorization Code Flow in production. | ||
> Take a look at the IdentityServer sample configuration in FoxIDs Control: [https://control.foxids.com/test-corp](https://control.foxids.com/test-corp) | ||
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication methods` tab. | ||
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication` tab. | ||
## Configure IdentityServer | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,14 +1,14 @@ | ||
# Connect Nets eID Broker as authentication method | ||
# Connect Nets eID Broker with OpenID Connect | ||
|
||
FoxIDs can be connected to Nets eID Broker with OpenID Connect and thereby authenticating end users with MitID and other credentials supported by Nets eID Broker. | ||
|
||
How to configure Nets eID Broker in | ||
- [test environment](#configuring-nets-eid-broker-demotest-as-openid-provider-op) using Nets eID Broker demo | ||
- [production environment](#configuring-nets-eid-broker-as-openid-provider-op) using Nets eID Broker admin portal | ||
|
||
> You can test the Nets eID Broker demo login with the [online web app sample](https://aspnetcoreoidcallupsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Nets eID Broker TEST`. | ||
> You can test the Nets eID Broker demo login with the [online web app sample](https://aspnetoidcsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Nets eID Broker TEST`. | ||
> Take a look at the Nets eID Broker sample configuration in FoxIDs Control: [https://control.foxids.com/test-corp](https://control.foxids.com/test-corp) | ||
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication methods` tab. | ||
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication` tab. | ||
## Configuring Nets eID Broker demo/test as OpenID Provider (OP) | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,10 +1,10 @@ | ||
# Connect Signicat as authentication method | ||
# Connect Signicat with OpenID Connect | ||
|
||
FoxIDs can be connected to Signicat with OpenID Connect and thereby authenticating end users with MitID and all other credentials supported by Signicat. | ||
|
||
> You can test the Signicat Express login with the [online web app sample](https://aspnetcoreoidcallupsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Signicat TEST`. | ||
> You can test the Signicat Express login with the [online web app sample](https://aspnetoidcsample.itfoxtec.com) ([sample docs](samples.md#aspnetcoreoidcauthcodealluppartiessample)) by clicking `Log in` and then `Signicat TEST`. | ||
> Take a look at the Signicat Express sample configuration in FoxIDs Control: [https://control.foxids.com/test-corp](https://control.foxids.com/test-corp) | ||
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication methods` tab. | ||
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication` tab. | ||
You can create a [free account](https://www.signicat.com/sign-up/express-api-onboarding) on [Signicat Express](https://developer.signicat.com/express/docs/) and get access to the [dashbord](https://dashboard-test.signicat.io/dashboard). | ||
Her you have access to the test environment. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,4 @@ | ||
# Connect Microsoft AD FS as authentication method | ||
# Connect Microsoft AD FS with SAML 2.0 | ||
|
||
FoxIDs can be connected to AD FS with a [SAML 2.0 authentication method](auth-method-saml-2.0.md). Where AD FS is a SAML 2.0 Identity Provider (IdP) and FoxIDs is acting as an SAML 2.0 Relying Party (RP). | ||
|
||
|
@@ -15,7 +15,7 @@ Recommended SAML 2.0 bindings: | |
Remark; The authn request redirect binding can result in a long query string which can cause problems I some devices. Therefore post binding is preferable. | ||
|
||
> Take a look at the AD FS sample configuration in FoxIDs Control: [https://control.foxids.com/test-corp](https://control.foxids.com/test-corp) | ||
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication methods` tab. | ||
> Get read access with the user `[email protected]` and password `TestAccess!` then select the `Production` environment and the `Authentication` tab. | ||
The following screen shot show the basic FoxIDs SAML 2.0 authentication method configuration using AD FS metadata in [FoxIDs Control Client](control.md#foxids-control-client). | ||
|
||
|
Oops, something went wrong.