billions-minister-2901
01/17/2025, 4:27 PMbrief-egg-61061
01/17/2025, 4:27 PMbrief-egg-61061
01/17/2025, 4:27 PMyaml selfservice: methods: oidc: config: providers: - id: generic # this is `<provider-id>` in the Authorization callback URL provider: generic client_id: .... # Replace with your Client ID client_secret: .... # Replace with your Client Secret issuer_url: <https://your-provider-issuer-url.com> mapper_url: "base64://{YOUR_BASE64_ENCODED_JSONNET_HERE}" # Alternatively, use a URL: # mapper_url: <https://your-storage-url.com/mapper-file> scope: - email # Add other scopes as needed claims_source: id_token # set to "userinfo" to read claims from the UserInfo endpoint enabled: true
5. Update your Ory Identities configuration with the new OIDC provider settings. 6. Set up the redirect URI in your OIDC provider's configuration. The redirect URI should follow this pattern: http(s)://<domain-of-ory-kratos>:<public-port>/self-service/methods/oidc/callback/<provider-id>
For more detailed information on setting up a custom OIDC provider, you can refer to the [Generic provider documentation](https://www.ory.sh/docs/kratos/social-signin/generic) and the [Self-hosted Kratos configuration guide](https://www.ory.sh/docs/self-hosted/kratos/configuration/oidc). Remember to handle the data mapping carefully to ensure that the required user information is correctly transferred from your OIDC provider to Ory Identities.billions-minister-2901
01/17/2025, 4:28 PMbrief-egg-61061
01/17/2025, 4:28 PMbrief-egg-61061
01/17/2025, 4:28 PM<https://your-project-slug.projects.oryapis.com/>
[Ory API Reference](https://www.ory.sh/docs/reference/api) shows an example: <https://playground.ory.sh/ory-hydra/public/>
2. For GitLab: <https://gitlab.com>
This example is from the [Github issue about exchanging external OIDC tokens](https://github.com/ory/hydra/issues/3723). 3. For a generic provider: <https://accounts.google.com>
This example is from the [Ory documentation on generic social sign-in providers](https://www.ory.sh/docs/kratos/social-signin/generic). When configuring your OIDC provider, you would typically use the base URL of the identity provider's authorization server. The exact format may vary depending on the provider you're using. Remember, the Issuer URL is crucial for the OpenID Connect discovery process. It's used to fetch the provider's configuration, including endpoints for authorization, token issuance, and JSON Web Key Sets (JWKS). When setting up your OIDC configuration in Ory, you would include the Issuer URL in the issuer_url
field of your provider configuration, as shown in the example from the Ory documentation: yaml providers: - id: generic provider: generic client_id: .... client_secret: .... issuer_url: <https://accounts.google.com> # Replace this with your provider's issuer URL
Always ensure you're using the correct Issuer URL for your specific OIDC provider to ensure proper functionality and security of your authentication system.