GSMA Mobile Connect
GSMA Mobile Connect is an application of OpenID Connect (OIDC). It enables mobile phones to serve as authentication devices independently of the service and the device.
Mobile Connect offers a standard way for Mobile Network Operators (MNOs) to act as general-purpose identity providers. It offers a range of Levels of Assurance (LoAs) and profile data to Mobile Connect-compliant service providers.
Mobile Connect roles
In a Mobile Connect deployment, AM can play the following roles:
- The OpenID provider
-
The provider implements the Mobile Connect Profile as part of the Service Provider (Identity Gateway interface).
The OpenID provider responds to a successful authorization request with all the required fields and the optional
expires_in
field. AM supports the mandatory ID Token properties. The relying party must use theexpires_in
value instead of specifyingmax_age
as a request parameter.AM returns the standard
userinfo
claims and theupdated_at
property. Theupdated_at
property holds the time last updated as seconds since January 1, 1970 UTC. - The authenticator
-
The authenticator implements the Mobile Connect Profile as part of the Identity Gateway (Authenticators interface).
The authenticator makes users authenticate at the appropriate LoA. A service provider can request LoAs without regard to the implementation. The Identity Gateway includes a claim in the ID Token to indicate the LoA achieved.
LoA support
AM maps LoAs to an authentication mechanism:
-
A service provider acting as a relying party requests an LoA with the
acr_values
parameter. -
AM returns the corresponding
acr
claim in the ID token.
LoA support:
-
1
(low—little or no confidence) -
2
(medium—some confidence, as in single-factor authentication) -
3
(high—high confidence, as in multi-factor authentication)
LoA support does not include support for 4
, which involves digital signatures.
The dtbs
authorization parameter is not supported.
Configure Mobile Connect
-
Configure the OAuth 2.0 provider OIDC authentication context settings to return
acr
andamr
claims in the ID tokens.For details, refer to Authentication requirements.
-
Update the identity store user configuration.
The
userinfo
endpoint returnsupdated_at
values in the ID token. If the user profile has never been updatedupdated_at
reflects creation time.When using DS as an identity store, AM takes
updated_at
from themodifyTimestamp
attribute if it exists, and thecreateTimestamp
attribute if not.In the AM admin UI, go to Realms > Realm Name > Identity Stores > Identity Store Name > User Configuration and add the relevant attributes to the LDAP User Attributes list.
-
Save your work.
Authorization parameters
You must use the authorization code grant to request ID tokens.
Request parameter | Supported? | Description |
---|---|---|
|
Yes |
The OpenID Connect authentication context class reference values. For details, refer to The |
|
Yes |
A unique string identifier for the application making the request. |
|
Yes |
A string value specifying the user interface display. |
|
No |
Data to be signed. LoA 4 is not supported. |
|
Yes |
A string specifying the ID used to log in. Set the |
|
Yes |
A string linking the client session with the ID token to mitigate against replay attacks. Required for Mobile Connect. |
|
Yes |
The URI to return the end user to after authorization is complete;
must match the |
|
Yes |
A string specifying the response expected from the authorization server; use |
|
Yes |
A string specifying the permissions the client application requests from the end user. Separate scopes with spaces. Required: Optional: |
|
Yes |
A string value to maintain state between the request and the callback. Required for Mobile Connect. |