OIDC ID Token Validator node
The OIDC ID Token Validator node lets PingOne Advanced Identity Cloud rely on an OIDC provider (OP)'s ID token to authenticate an end user. The node evaluates whether the ID token is valid according to the OIDC specification.
To configure the node, first get an id_token
from an OIDC client and examine the decoded JWT to
view the required claims values.
This example uses an id_token
from the OAuth 2.0 Playground:
{
"iss": "https://accounts.google.com",
"azp": "407408718192.apps.googleusercontent.com",
"aud": "407408718192.apps.googleusercontent.com",
"sub": "111730983950574648607",
"at_hash": "kvQJZrGcnNMZqM4w68DFBA",
"iat": 1677608448,
"exp": 1677612048
}
The iss
, azp
, and aud
claims provide the values for the node’s Token Issuer
,
Authorized parties
and Audience name
properties respectively.
To use the OIDC ID Token Validator node to authenticate a user, first configure the node to run a transformation script that maps the user attributes from the JWT to local attributes. You can then create a journey with a Scripted Decision node that stores the attributes in the shared node state so that you can authenticate the user with an ID token.
Compatibility
Product | Compatible? |
---|---|
Advanced Identity Cloud |
Yes |
PingAM (self-managed) |
Yes |
Ping Identity Platform (self-managed) |
Yes |
Configuration
Property | Usage |
---|---|
OpenID Connect Validation Type |
To validate the ID token from the OP, the node requires either a URL to get the public keys for the provider, or the symmetric key for an ID token signed with an HMAC-based algorithm. Select one of the following options to determine how the node retrieves the required information:
|
OpenID Connect Validation Value |
The well-known URL or URL to the JWK location, depending on the value of |
Client Secret Label |
The secret label to which the OIDC client secret should be mapped. Only required if the validation type is You can specify an existing label or PingOne Advanced Identity Cloud creates a new one dynamically. The label can only contain alphanumeric characters |
ID Token Header Name |
The name of the HTTP request header referencing the ID token. Default: |
Token Issuer |
The issuer of the OIDC ID token, which is checked against the For example: |
Audience name |
The case-sensitive name of the intended audience for this node, which is checked against the |
Authorized parties |
The authorized parties from which the node accepts ID tokens, which is checked against the The value can be either a case-sensitive string or a URI. |
Transformation Script |
Select a For examples of transformation (normalization) scripts, refer to the Example or the |
Script Inputs |
A list of state inputs for the script. Default: |
Unreasonable Lifetime Limit |
Specify the maximum permitted lifetime of the token in minutes. If the Default: |
Outputs
The node relies on the transformation script to set profile attributes required later in the journey.
Outcomes
-
True
-
False
Evaluation continues along the True
path if the ID token is valid;
otherwise, evaluation continues along the False
path.
Errors
The node logs the following warnings:
-
No OpenIdConnect ID Token referenced by header value: {}
: if the node can’t read the ID token in the HTTP request header. -
Error evaluating the script
: if there is a problem with the transformation script.
The node logs an error if an AuthLoginException
occurs during node processing.
Example
This example demonstrates how to use the OIDC ID Token Validator node as part of a journey to validate an ID token and authenticate the user.
You can access all the provided JWT claims through the jwtClaims
attribute.
This JavaScript, configured as the node’s transformation script, retrieves the user ID from the JWT.
(function () {
var fr = JavaImporter( org.forgerock.json.JsonValue);
var identity = fr.JsonValue.json(fr.JsonValue.object());
identity.put('uid', jwtClaims.get('sub'));
return identity;
}());
A Scripted Decision node runs this script
to find the username from lookupAttributes
and store it in the shared node state:
-
Next-generation
-
Legacy
var attributes = nodeState.get("lookupAttributes");
var userName = attributes.get("uid");
// Add userName in objectAttributes to nodeState for use by Identify Existing User node.
nodeState.putShared("objectAttributes", attributes);
// Add username at the root level so that a session can be created
nodeState.putShared("username", userName);
action.goTo('true');
var attributes = nodeState.get("lookupAttributes");
var userName = attributes.get("uid").asString();
// Add userName in objectAttributes to nodeState for use by Identify Existing User node.
nodeState.putShared("objectAttributes", attributes);
// Add username at the root level so that a session can be created
nodeState.putShared("username", userName);
outcome = "true";
The Identify Existing User node then performs a lookup on IDM with the _id
attribute
using the username saved into shared state by the Scripted Decision node.
The following REST call authenticates the user with the example journey, providing the ID token in the header:
$ curl \
--request POST \
--header "Content-Type: application/json" \
--header "Accept-API-Version: resource=2.0, protocol=1.0" \
--header "oidc_id_token: <id_token>" \
"https://<tenant-env-fqdn>/am/json/realms/root/realms/alpha/authenticate?authIndexType=service&authIndexValue=myJourney"
{
"tokenId": "AQIC5w…NTcy*",
"successUrl": "/openam/console",
"realm": "/alpha"
}