Configure services
You can configure services globally or per realm. Global services affect all realms in Identity Cloud. Realm services affect only the realm in which they’re configured.
Global services
In the AM admin UI, under Configure > Global Services, you will find the CORS Service and the Dashboard service.
These services affect all realms in Identity Cloud.
CORS Service
Configuration
The following settings appear on the Configuration tab:
- Enable the CORS filter
-
If disable, no CORS headers will be added to responses.
Default value:
true
amster
attribute:enabled
Secondary Configurations
This service has the following Secondary Configurations.
configuration
- Enable the CORS filter
-
If disable, no CORS headers will be added to responses.
Default value:
false
amster
attribute:enabled
- Accepted Origins
-
The set of accepted origins.
amster
attribute:acceptedOrigins
- Accepted Methods
-
The set of (non-simple) accepted methods, included in the pre-flight response in the header Access-Control-Allow-Methods.
amster
attribute:acceptedMethods
- Accepted Headers
-
The set of (non-simple) accepted headers, included in the pre-flight response in the header Access-Control-Allow-Headers.
amster
attribute:acceptedHeaders
- Exposed Headers
-
The set of headers to transmit in the header Access-Control-Expose-Headers.
amster
attribute:exposedHeaders
- Max Age
-
The max age (in seconds) for caching, included in the pre-flight response in the header Access-Control-Max-Age.
Default value:
0
amster
attribute:maxAge
- Allow Credentials
-
Whether to transmit the Access-Control-Allow-Credentials: true header in the response.
Default value:
false
amster
attribute:allowCredentials
Dashboard
Realm Defaults
The following settings appear on the Realm Defaults tab:
- Available Dashboard Apps
-
List of application dashboard names available by default for realms with the Dashboard service configured.
amster
attribute:assignedDashboard
Secondary Configurations
This service has the following Secondary Configurations.
instances
- Dashboard Class Name
-
Identifies how to access the application, for example
SAML2ApplicationClass
for a SAML 2.0 application.amster
attribute:className
- Dashboard Name
-
The application name as it will appear to the administrator for configuring the dashboard.
amster
attribute:name
- Dashboard Display Name
-
The application name that displays on the dashboard client.
amster
attribute:displayName
- Dashboard Icon
-
The icon name that will be displayed on the dashboard client identifying the application.
amster
attribute:icon
- Dashboard Login
-
The URL that takes the user to the application.
amster
attribute:login
- ICF Identifier
-
amster
attribute:icfIdentifier
Realm services
In the AM admin UI, under Realms > Realm Name > Services, you can enable, remove, or configure different services for individual realms.
Android Key Attestation Service
The following settings are available in this service:
- Cache duration (hours)
-
The number of hours to cache the certificate revocation status list and Google hardware attestation root certificate.
Defaults to one day (
24
).Specify
0
to prevent caching. - Certificate revocation status list URL
-
The URL to retrieve the certificate revocation status list (CRL).
Keys are checked against the revocation status list to ensure they have not been revoked or suspended.
Keys can be revoked for a number of reasons, including mishandling or suspected extraction by an attacker.
Defaults to
https://android.googleapis.com/attestation/status
- a list maintained by Google. - Google hardware attestation root certificate URL
-
The URL for retrieving the Google hardware attestation root certificates.
Refer to Verifying hardware-backed key pairs with Key Attestation in the Android developer documentation.
If you do not provide a URL, you must map the certificate using the secret ID
am.services.attestation.google.public.key
.For more information, refer to Use ESVs for signing and encryption keys.
Base URL Source
The following settings are available in this service:
- Base URL Source
-
Specifies how the base URL is generated.
The following values are supported:
-
Extension class (
EXTENSION_CLASS
). The extension class returns a base URL from a provided HttpServletRequest. In the Extension class name field, enterorg.forgerock.openam.services.baseurl.BaseURLProvider
. -
Fixed value (
FIXED_VALUE
). The base URL is retrieved from the value specified in the Fixed value base URL field. -
Forwarded header (
FORWARDED_HEADER
). The base URL is retrieved from a forwarded header field in the HTTP request. The Forwarded HTTP header field is standardized and specified in RFC7239. -
Host/protocol from incoming request (
REQUEST_VALUES
). The hostname, server name, and port are retrieved from the incoming HTTP request. -
X-Forwarded-* headers (
X_FORWARDED_HEADERS
). The base URL is retrieved from non-standard header fields, such asX-Forwarded-For
,X-Forwarded-By
,X-Forwarded-Proto
,X-Forwarded-Host
andX-Forwarded-Port
.If the
X-Forwarded-Proto
header is not provided, the server uses a fallback scheme, based on the URI of the request.If multiple
X-Forwarded-Host
headers are specified, the outermost proxy host is used.
Default value:
REQUEST_VALUES
amster
attribute:source
-
Device Profiles Service
The following settings are available in this service:
- Profile Storage Attribute
-
The user’s attribute in which to store Device profiles.
amster
attribute:deviceProfilesAttrName
- Device Profile Encryption Scheme
-
Encryption scheme to use to secure device profiles stored on the server.
If enabled, each device profile is encrypted using a unique random secret key using the given strength of AES encryption in CBC mode with PKCS#5 padding. An HMAC-SHA of the given strength (truncated to half-size) is used to ensure integrity protection and authenticated encryption. The unique random key is encrypted with the given RSA key pair and stored with the device profile.
Note: AES-256 may require installation of the JCE Unlimited Strength policy files.
The possible values for this property are:
-
Label: AES-256/HMAC-SHA-512 with RSA Key Wrapping (Value:
RSAES_AES256CBC_HS512
) -
Label: AES-128/HMAC-SHA-256 with RSA Key Wrapping (Value:
RSAES_AES128CBC_HS256
) -
Label: No encryption of device settings. (Value:
NONE
)
amster
attribute:deviceProfilesSettingsEncryptionScheme
-
- Encryption Key Store
-
Path to the key store from which to load encryption keys.
Updating this setting is currently not supported in Identity Cloud. Changing its value may lead to a loss of functionality in this feature.
The configuration will be migrated in the future to support customization of keys using ESVs. For more information, please contact your ForgeRock representative.
amster
attribute:deviceProfilesSettingsEncryptionKeystore
- Key Store Type
-
Type of key store to load.
Refer to the JDK 8 PKCS#11 Reference Guide for more details.
The possible values for this property are:
-
Label: Java Key Store (JKS). (Value:
JKS
) -
Label: Java Cryptography Extension Key Store (JCEKS). (Value:
JCEKS
) -
Label: PKCS#11 Hardware Crypto Storage. (Value:
PKCS11
) -
Label: PKCS#12 Key Store. (Value:
PKCS12
)
amster
attribute:deviceProfilesSettingsEncryptionKeystoreType
-
- Key Store Password
-
Password to unlock the key store. This password is encrypted when it is saved in the Identity Cloud configuration.
amster
attribute:deviceProfilesSettingsEncryptionKeystorePassword
- Key-Pair Alias
-
Alias of the certificate and private key in the key store. The private key is used to encrypt and decrypt device profiles.
amster
attribute:deviceProfilesSettingsEncryptionKeystoreKeyPairAlias
- Private Key Password
-
Password to unlock the private key.
amster
attribute:deviceProfilesSettingsEncryptionKeystorePrivateKeyPassword
Email Service
The Email Service is not currently used in Identity Cloud. |
The following settings are available in this service:
- Email From Address
-
Specifies the address from which to send email notifications.
For example, you might set this property to: no-reply@example.com
For Microsoft Graph API transport configurations, this must exist as a valid address in the Microsoft Exchange administration center.
amster
attribute:from
- Email Attribute Name
-
Specifies the profile attribute from which to retrieve the end user’s email address.
Default value:
mail
amster
attribute:emailAddressAttribute
- Email Subject
-
Specifies a subject for notification messages. If you do not set this, Identity Cloud does not set the subject for notification messages.
amster
attribute:subject
- Email Content
-
Specifies content for notification messages. If you do not set this, Identity Cloud includes only the confirmation URL in the mail body.
amster
attribute:message
- Email Rate Limit
-
Specifies the minimum number of seconds that must elapse between sending emails to an individual user.
Default value:
1
amster
attribute:emailRateLimitSeconds
- Transport Type
-
The mail server transport type to use. This value must be set to one of the secondary configurations.
amster
attribute:transportType
Secondary configurations
This service has the following secondary configurations.
Microsoft Graph API
- Email Message Implementation Class
-
Specifies the class that sends email notifications, such as those sent for user registration and forgotten passwords.
Default value:
org.forgerock.openam.services.email.rest.MicrosoftRestMailServer
amster
attribute:emailImplClassName
- Email Rest Endpoint URL
-
Specifies the REST endpoint for sending emails, in the format
https://graph.microsoft.com/v1.0/users/USER ID/sendMail
.Refer to the sendMail API reference for details.
amster
attribute:emailEndpoint
- OAuth2 Token Endpoint URL
-
Specifies the endpoint for OAuth 2.0 authentication, in the format
https://login.microsoftonline.com/TENANT ID/oauth2/v2.0/token
.amster
attribute:tokenEndpoint
- OAuth2 Client Id
-
Specifies the client ID for use in OAuth 2.0 authentication.
This is the client ID or application ID provided by the Microsoft Application Registration portal.
amster
attribute:clientId
- OAuth2 Scopes
-
Specifies the scopes to request as part of the OAuth 2.0 authentication.
The value supported by Microsoft Graph API is
https://graph.microsoft.com/.default
.amster
attribute:scope
SMTP
- Email Message Implementation Class
-
Specifies the class that sends email notifications, such as those sent for user registration and forgotten passwords.
amster
attribute:emailImplClassName
- Mail Server Host Name
-
Specifies the fully qualified domain name of the SMTP mail server through which to send email notifications.
For example, you might set this property to: smtp.example.com
amster
attribute:hostname
- Mail Server Host Port
-
Specifies the port number for the SMTP mail server.
amster
attribute:port
- Mail Server Authentication Username
-
Specifies the username for the SMTP mail server.
For example, you might set this property to: username
amster
attribute:username
- Mail Server Authentication Password
-
Specifies the password for the SMTP username.
amster
attribute:password
- Mail Server Secure Connection
-
Specifies whether to connect to the SMTP mail server using SSL.
The possible values for this property are:
-
SSL
-
Non SSL
-
Start TLS
amster
attribute:sslState
-
ForgeRock Authenticator (OATH) Service
The following settings are available in this service:
- Profile Storage Attribute
-
Attribute for storing ForgeRock Authenticator OATH profiles.
amster
attribute:oathAttrName
- Device Profile Encryption Scheme
-
Encryption scheme for securing device profiles stored on the server.
If enabled, each device profile is encrypted using a unique random secret key using the given strength of AES encryption in CBC mode with PKCS#5 padding. An HMAC-SHA of the given strength (truncated to half-size) is used to ensure integrity protection and authenticated encryption. The unique random key is encrypted with the given RSA key pair and stored with the device profile.
Note: AES-256 may require installation of the JCE Unlimited Strength policy files.
The possible values for this property are:
-
Label: AES-256/HMAC-SHA-512 with RSA Key Wrapping (Value:
RSAES_AES256CBC_HS512
) -
Label: AES-128/HMAC-SHA-256 with RSA Key Wrapping (Value:
RSAES_AES128CBC_HS256
) -
Label: No encryption of device settings. (Value:
NONE
)
amster
attribute:authenticatorOATHDeviceSettingsEncryptionScheme
-
- Encryption Key Store
-
Path to the key store from which to load encryption keys.
Updating this setting is currently not supported in Identity Cloud. Changing its value may lead to a loss of functionality in this feature.
The configuration will be migrated in the future to support customization of keys using ESVs. For more information, please contact your ForgeRock representative.
amster
attribute:authenticatorOATHDeviceSettingsEncryptionKeystore
- Key Store Type
-
Type of encryption key store.
Refer to the JDK 8 PKCS#11 Reference Guide for more details.
The possible values for this property are:
-
Label: Java Key Store (JKS). (Value:
JKS
) -
Label: Java Cryptography Extension Key Store (JCEKS). (Value:
JCEKS
) -
Label: PKCS#11 Hardware Crypto Storage. (Value:
PKCS11
) -
Label: PKCS#12 Key Store. (Value:
PKCS12
)
amster
attribute:authenticatorOATHDeviceSettingsEncryptionKeystoreType
-
- Key Store Password
-
Password to unlock the key store. This password will be encrypted.
amster
attribute:authenticatorOATHDeviceSettingsEncryptionKeystorePassword
- Key-Pair Alias
-
Alias of the certificate and private key in the key store. The private key is used to encrypt and decrypt device profiles.
amster
attribute:authenticatorOATHDeviceSettingsEncryptionKeystoreKeyPairAlias
- Private Key Password
-
Password to unlock the private key.
amster
attribute:authenticatorOATHDeviceSettingsEncryptionKeystorePrivateKeyPassword
- ForgeRock Authenticator (OATH) Device Skippable Attribute Name
-
The data store attribute that holds the user’s decision to enable or disable obtaining and providing a password obtained from the ForgeRock Authenticator app. This attribute must be writeable.
amster
attribute:authenticatorOATHSkippableName
ForgeRock Authenticator (Push) Service
The following settings are available in this service:
- Profile Storage Attribute
-
The user’s attribute in which to store Push Notification profiles.
amster
attribute:pushAttrName
- Device Profile Encryption Scheme
-
Encryption scheme to use to secure device profiles stored on the server.
If enabled, each device profile is encrypted using a unique random secret key using the given strength of AES encryption in CBC mode with PKCS#5 padding. An HMAC-SHA of the given strength (truncated to half-size) is used to ensure integrity protection and authenticated encryption. The unique random key is encrypted with the given RSA key pair and stored with the device profile.
Note: AES-256 may require installation of the JCE Unlimited Strength policy files.
The possible values for this property are:
-
Label: AES-256/HMAC-SHA-512 with RSA Key Wrapping (Value:
RSAES_AES256CBC_HS512
) -
Label: AES-128/HMAC-SHA-256 with RSA Key Wrapping (Value:
RSAES_AES128CBC_HS256
) -
Label: No encryption of device settings. (Value:
NONE
)
amster
attribute:authenticatorPushDeviceSettingsEncryptionScheme
-
- Encryption Key Store
-
Path to the key store from which to load encryption keys.
Updating this setting is currently not supported in Identity Cloud. Changing its value may lead to a loss of functionality in this feature.
The configuration will be migrated in the future to support customization of keys using ESVs. For more information, please contact your ForgeRock representative.
amster
attribute:authenticatorPushDeviceSettingsEncryptionKeystore
- Key Store Type
-
Type of key store to load.
Refer to the JDK 8 PKCS#11 Reference Guide for more details.
The possible values for this property are:
-
Label: Java Key Store (JKS). (Value:
JKS
) -
Label: Java Cryptography Extension Key Store (JCEKS). (Value:
JCEKS
) -
Label: PKCS#11 Hardware Crypto Storage. (Value:
PKCS11
) -
Label: PKCS#12 Key Store. (Value:
PKCS12
)
amster
attribute:authenticatorPushDeviceSettingsEncryptionKeystoreType
-
- Key Store Password
-
Password to unlock the key store. This password is encrypted when it is saved in the Identity Cloud configuration.
amster
attribute:authenticatorPushDeviceSettingsEncryptionKeystorePassword
- Key-Pair Alias
-
Alias of the certificate and private key in the key store. The private key is used to encrypt and decrypt device profiles.
amster
attribute:authenticatorPushDeviceSettingsEncryptionKeystoreKeyPairAlias
- Private Key Password
-
Password to unlock the private key.
amster
attribute:authenticatorPushDeviceSettingsEncryptionKeystorePrivateKeyPassword
- ForgeRock Authenticator (Push) Device Skippable Attribute Name
-
Name of the attribute on a user’s profile used to store their selection of whether to skip ForgeRock Authenticator (Push) 2FA modules.
amster
attribute:authenticatorPushSkippableName
Globalization Settings
The following settings are available in this service:
- Auto Generated Common Name Format
-
Use this list to configure how Identity Cloud formats names shown in the console banner.
This setting allows the name of the authenticated user shown in the AM admin UI to be customised based on the locale of the user.
amster
attribute:commonNameFormats
IoT Service
The following settings are available in this service:
- Create OAuth 2.0 Client
-
Create an OAuth 2.0 Client with the given name and default configuration required to serve as the client for the IoT Service. The client will be created without any scope(s).
- OAuth 2.0 Client Name
-
The name of the default OAuth 2.0 Client used by the IoT Service to request access tokens for things.
- Create OAuth 2.0 JWT Issuer
-
Create a Trusted JWT Issuer with the given name and default configuration required for the IoT Service to act as the Issuer when handling request for thing access tokens.
- OAuth 2.0 JWT Issuer Name
-
The name of the Trusted JWT Issuer used by the IoT Service to request access tokens for things.
- OAuth 2.0 Subject Attribute
-
The name of the identity store attribute from which to read the OAuth 2.0 subject value. The subject is used in access tokens issued for things. This allows the thing’s access token subject to have a value other than the thing’s ID, which is the value used by default.
- Readable Attributes
-
Specifies the list of attributes that a thing is allowed to request from its identity.
OAuth 2.0 provider
Core
The following settings appear on the Core tab:
- Use Client-Side Access & Refresh Tokens
-
When enabled, Identity Cloud issues access and refresh tokens that can be inspected by resource servers.
You can override this setting for individual clients. To access the client application settings in the AM admin UI, go to [.label]#Realms > _Realm Name_ > Applications > OAuth 2.0 > Clients > _Client ID_#.
amster
attribute:statelessTokensEnabled
- Use Macaroon Access and Refresh Tokens
-
When enabled, AM will issue access and refresh tokens as Macaroons with caveats.
amster
attribute:macaroonTokensEnabled
- Authorization Code Lifetime (seconds)
-
The time an authorization code is valid for, in seconds.
amster
attribute:codeLifetime
- Refresh Token Lifetime (seconds)
-
The time in seconds a refresh token is valid for. If this field is set to
-1
, the refresh token will never expire.amster
attribute:refreshTokenLifetime
- Access Token Lifetime (seconds)
-
The time an access token is valid for, in seconds. Note that if you set the value to
0
, the access token will not be valid. A maximum lifetime of 600 seconds is recommended.amster
attribute:accessTokenLifetime
- Issue Refresh Tokens
-
Whether to issue a refresh token when returning an access token.
You can override this setting for individual clients. To access the client application settings in the AM admin UI, go to [.label]#Realms > _Realm Name_ > Applications > OAuth 2.0 > Clients > _Client ID_#.
amster
attribute:issueRefreshToken
- Issue Refresh Tokens on Refreshing Access Tokens
-
Whether to issue a refresh token when refreshing an access token.
You can override this setting for individual clients. To access the client application settings in the AM admin UI, go to [.label]#Realms > _Realm Name_ > Applications > OAuth 2.0 > Clients > _Client ID_#.
amster
attribute:issueRefreshTokenOnRefreshedToken
- Use Policy Engine for Scope decisions
-
With this setting enabled, the policy engine is consulted for each scope value that is requested.
Scope decisions are made in the following way when based on the policy engine:
-
If a policy returns an action of GRANT=true, the scope is consented automatically, and the user is not consulted in a user-interaction flow.
-
If a policy returns an action of GRANT=false, the scope is not added to any resulting token, and the user will not refer to it in a user-interaction flow.
-
If no policy returns a value for the GRANT action:
-
For user-facing grant types, such as the authorization or device code flows, the user is asked for consent or saved consent is used.
-
For grant types that are not user-facing, such as those using password or client credentials, the scope is not added to any resulting token.
-
You can override this setting for individual clients. To access the client application settings in the AM admin UI, go to [.label]#Realms > _Realm Name_ > Applications > OAuth 2.0 > Clients > _Client ID_#.
amster
attribute:usePolicyEngineForScope
-
- Scopes Policy Set
-
The policy set that defines the context in which policy evaluations occur when
Use Policy Engine for Scope decisions
is enabled on the OAuth 2.0 provider. Leave this field blank, or set it tooauth2Scopes
to use the default policy set.You can override this setting for individual clients. To access the client application settings in the AM admin UI, go to [.label]#Realms > _Realm Name_ > Applications > OAuth 2.0 > Clients > _Client ID_#.
Default value:
[Empty]
- OAuth2 Access Token May Act Script
-
The script that is executed when issuing an access token explicitly to modify the
may_act
claim placed on the token.You can override this setting for individual clients. To access the client application settings in the AM admin UI, go to [.label]#Realms > _Realm Name_ > Applications > OAuth 2.0 > Clients > _Client ID_#.
The possible values for this property are:
-
c735de08-f8f2-4e69-aa4a-2d8d3d438323
. OAuth2 May Act Script -
[Empty]
. --- Select a script ---
amster
attribute:accessTokenMayActScript
-
- OIDC ID Token May Act Script
-
The script that is executed when issuing an OIDC ID Token explicitly to modify the
may_act
claim placed on the token.You can override this setting for individual clients. To access the client application settings in the AM admin UI, go to [.label]#Realms > _Realm Name_ > Applications > OAuth 2.0 > Clients > _Client ID_#.
The possible values for this property are:
-
c735de08-f8f2-4e69-aa4a-2d8d3d438323
. OAuth2 May Act Script -
[Empty]
. --- Select a script ---
amster
attribute:oidcMayActScript
-
Advanced
The following settings appear on the Advanced tab:
- Custom Login URL Template
-
Custom URL for handling login, to override the default Identity Cloud login page.
Supports Freemarker syntax, with the following variables:
Variable
Description
gotoUrl
The URL to redirect to after login.
acrValues
The Authentication Context Class Reference (acr) values for the authorization request.
realm
The Identity Cloud realm the authorization request was made on.
service
The name of the authentication journey requested to perform resource owner authentication.
locale
A space-separated list of locales, ordered by preference.
The following example template redirects users to a custom page to handle login. This page redirects to the
/oauth2/authorize
endpoint with any required parameters:http://mylogin.com/login?goto=${goto}<#if acrValues??>&acr_values=${acrValues}</#if><#if realm??>&realm=${realm}</#if><#if module??>&module=${module}</#if><#if service??>&service=${service}</#if><#if locale??>&locale=${locale}</#if>
The default Identity Cloud login page is constructed using "Base URL Source" service. You can override this setting for individual clients. To access the client application settings in the AM admin UI, go to [.label]#Realms > _Realm Name_ > Applications > OAuth 2.0 > Clients > _Client ID_#.
amster
attribute:customLoginUrlTemplate
- Scope Implementation Class
-
The class that contains the required scope implementation, must implement the
org.forgerock.oauth2.core.ScopeValidator
interface.You can override this setting for individual clients. To access the client application settings in the AM admin UI, go to [.label]#Realms > _Realm Name_ > Applications > OAuth 2.0 > Clients > _Client ID_#.
amster
attribute:scopeImplementationClass
- Additional Audience Values
-
The additional audience values that will be permitted when verifying Client Authentication JWTs.
These audience values will be in addition to the AS base, issuer and endpoint URIs.
amster
attribute:allowedAudienceValues
- User Profile Attribute(s) the Resource Owner is Authenticated On
-
Names of profile attributes that resource owners use to log in. You can add others to the default, for example
mail
.amster
attribute:authenticationAttributes
- User Display Name attribute
-
The profile attribute that contains the name to be displayed for the user on the consent page.
amster
attribute:displayNameAttribute
- Client Registration Scope Allowlist
-
The set of scopes allowed when registering clients dynamically, with translations.
Scopes may be entered as simple strings or pipe-separated strings representing the internal scope name, locale, and localized description.
For example:
read|en|Permission to view email messages in your account
Locale strings are in the format:
language_country_variant
, for exampleen
,en_GB
, oren_US_WIN
.If the locale and pipe is omitted, the description is displayed to all users that have undefined locales.
If the description is also omitted, nothing is displayed on the consent page for the scope. For example specifying
read|
would allow the scope read to be used by the client, but would not display it to the user on the consent page when requested.amster
attribute:supportedScopes
- Subject Types supported
-
List of subject types supported. Valid values are:
-
public
- Each client receives the same subject (sub
) value. -
pairwise
- Each client receives a different subject (sub
) value, to prevent correlation between clients.
amster
attribute:supportedSubjectTypes
-
- Default Client Scopes
-
List of scopes a client will be granted if they request registration without specifying which scopes they want. Default scopes are NOT auto-granted to clients created through the AM admin UI.
amster
attribute:defaultScopes
- OAuth2 Token Signing Algorithm
-
Algorithm used to sign client-side OAuth 2.0 tokens in order to detect tampering.
Identity Cloud supports the signing algorithms listed in JSON Web Algorithms (JWA): "alg" (Algorithm) Header Parameter Values for JWS:
-
HS256
- HMAC with SHA-256. -
HS384
- HMAC with SHA-384. -
HS512
- HMAC with SHA-512. -
ES256
- ECDSA with SHA-256 and NIST standard P-256 elliptic curve. -
ES384
- ECDSA with SHA-384 and NIST standard P-384 elliptic curve. -
ES512
- ECDSA with SHA-512 and NIST standard P-521 elliptic curve. -
RS256
- RSASSA-PKCS-v1_5 using SHA-256.The possible values for this property are:
-
HS256
-
HS384
-
HS512
-
RS256
-
RS384
-
RS512
-
ES256
-
ES384
-
ES512
-
PS256
-
PS384
-
PS512
amster
attribute:tokenSigningAlgorithm
-
- Client-Side Token Compression
-
Whether client-side access and refresh tokens should be compressed.
amster
attribute:tokenCompressionEnabled
- Encrypt Client-Side Tokens
-
Whether client-side access and refresh tokens should be encrypted.
Enabling token encryption will disable token signing as encryption is performed using direct symmetric encryption.
You can override this setting for individual clients. To access the client application settings in the AM admin UI, go to [.label]#Realms > _Realm Name_ > Applications > OAuth 2.0 > Clients > _Client ID_#.
amster
attribute:tokenEncryptionEnabled
- Subject Identifier Hash Salt
-
If pairwise subject types are supported, it is STRONGLY RECOMMENDED to change this value. It is used in the salting of hashes for returning specific
sub
claims to individuals using the samerequest_uri
orsector_identifier_uri
.amster
attribute:hashSalt
- Code Verifier Parameter Required
-
If enabled, requests using the authorization code grant or device flow require a
code_challenge
attribute to comply with the PKCE standard.For more information, read the PKCE specification.
Note that if a client specifies a
code_challenge
parameter in the authorization request, PKCE is enabled regardless of the value of this attribute.The possible values for this property are:
-
true
. All requests -
public
. Requests from all public clients -
passwordless
. Requests from all passwordless public clients -
false
. No requests
amster
attribute:codeVerifierEnforced
-
- Modified Timestamp Attribute Name
-
The identity Data Store attribute used to return modified timestamp values.
This attribute is paired together with the Created Timestamp Attribute Name attribute (
createdTimestampAttribute
). You can leave both attributes unset (default) or set them both. If you set only one attribute and leave the other blank, the access token fails with a 500 error.For example, when you configure Identity Cloud as an OIDC Provider in a Mobile Connect application, the client accesses the
userinfo
endpoint to obtain theupdated_at
claim value in the ID token. Theupdated_at
claim gets its value from themodifiedTimestampAttribute
attribute in the user profile. If the profile has never been modified, theupdated_at
claim uses thecreatedTimestampAttribute
attribute.amster
attribute:modifiedTimestampAttribute
- Created Timestamp Attribute Name
-
The identity Data Store attribute used to return created timestamp values.
amster
attribute:createdTimestampAttribute
- Password Grant Authentication Service
-
The journey used to authenticate the username and password for the Resource owner password credentials grant.
The list of possible values for this property reflects the list of configured authentication journeys.
Don’t change the default value (
PasswordGrant
) unless you have configured a suitable replacement journey.amster
attribute:passwordGrantAuthService
- Enable Auth Module Messages for Password Credentials Grant
-
If enabled, authentication module failure messages are used to create Resource Owner Password Credentials Grant failure messages. If disabled, a standard authentication failed message is used.
The Password Grant Type requires the
grant_type=password
parameter.amster
attribute:moduleMessageEnabledInPasswordGrant
- Grant Types
-
The set of Grant Types (OAuth 2.0 flows) this client can use.
If you don’t set any Grant Types here, the client can’t use any OAuth 2.0 flows.
amster
attribute:grantTypes
- Trusted TLS Client Certificate Header
-
HTTP Header to receive TLS client certificates when TLS is terminated at a proxy.
Leave blank if not terminating TLS at a proxy. Configure the proxy to strip this header from incoming requests. Best practice is to use a random string.
amster
attribute:tlsClientCertificateTrustedHeader
- TLS Client Certificate Header Format
-
Format of the HTTP header used to communicate a client certificate from a reverse proxy.
The following formats are supported:
-
URLENCODED_PEM
- a URL-encoded PEM format certificate. This is the format used by Nginx. -
X_FORWARDED_CLIENT_CERT
- the X-Forwarded-Client-Certformat used by Envoy and Istio.The possible values for this property are:
-
URLENCODED_PEM
-
X_FORWARDED_CLIENT_CERT
amster
attribute:tlsClientCertificateHeaderFormat
-
- Support TLS Certificate-Bound Access Tokens
-
Whether to bind access tokens to the client certificate when using TLS client certificate authentication.
amster
attribute:tlsCertificateBoundAccessTokensEnabled
- Check TLS Certificate Revocation Status
-
Whether to check if TLS client certificates have been revoked.
If enabled then AM will check if TLS client certificates used for client authentication have been revoked using either OCSP (preferred) or CRL. AM implements "soft fail" semantics: if the revocation status cannot be established due to a temporary error (e.g., network error) then the certificate is assumed to still be valid.
amster
attribute:tlsCertificateRevocationCheckingEnabled
- OCSP Responder URI
-
URI of the OCSP responder service to use for checking certificate revocation status.
If specified this value overrides any OCSP or CRL mechanisms specified in individual certificates.
amster
attribute:tlsOcspResponderUri
- OCSP Responder Certificate
-
PEM-encoded certificate to use to verify OCSP responses.
If specified this certificate will be used to verify the signature on all OCSP responses. Otherwise the appropriate certificate will be determined from the trusted CA certificates.
amster
attribute:tlsOcspResponderCert
- Macaroon Token Format
-
The format to use when serializing and parsing Macaroons. V1 is bulky and should only be used when compatibility with older Macaroon libraries is required.
The possible values for this property are:
-
V1
-
V2
amster
attribute:macaroonTokenFormat
-
- Require exp claim in Request Object
-
If enabled, the
exp
claim must be included in JWT request objects specified at /oauth2/authorize or /oauth2/par.The
exp
(expiration time) claim defines the lifetime of the JWT, after which the JWT is no longer valid.To comply with the FAPI security profile, this setting must be enabled.
Default value:
false
amster
attribute:expClaimRequiredInRequestObject
- Require nbf claim in Request Object
-
If enabled, the
nbf
claim must be included in JWT request objects specified at /oauth2/authorize or /oauth2/par.The
nbf
(not before) claim defines the earliest time that the JWT can be accepted for processing.To comply with the FAPI security profile, this setting must be enabled.
Default value:
false
amster
attribute:nbfClaimRequiredInRequestObject
- Max nbf and exp difference
-
The maximum permitted difference, in minutes, between the
nbf
andexp
claims, as defined in the request object JWT.A value of 0 indicates that there is no maximum time requirement.
If set to a value greater than 0, and either
nbf
orexp
is not defined, the JWT is validated successfully, providing the claims are not required.If set to a value greater than 0, and both claims are present, the JWT is validated accordingly, even when not required.
To comply with the FAPI security profile, this setting must be 60 (minutes) or less.
Default value:
0
amster
attribute:maxDifferenceBetweenRequestObjectNbfAndExp
- Max nbf age
-
The maximum permitted age, in minutes, of the
nbf
claim.A value of 0 indicates that there is no maximum time requirement.
If set to a value greater than 0, and
nbf
is neither required nor specified, the JWT is validated successfully.If set to a value greater than 0, and
nbf
is present, the JWT is validated accordingly, even when not required.To comply with the FAPI security profile, this setting must be 60 (minutes) or less.
Default value:
0
amster
attribute:maxAgeOfRequestObjectNbfClaim
- Request Object Processing Specification
-
For OIDC requests only, this setting determines which specification is used to validate request object JWTs.
For example, the following OIDC request specifies a request object JWT and could be validated either according to the JAR specification or as a standard OIDC request:
/authorize?client_id=myClient&request={JWT with scope=openid, response_type=id_token}
OAuth 2.0 requests that do not fall into this category, such as PAR or non-OIDC JWT requests, are processed according to the JAR specification, regardless of the value of this setting.
The possible values are:
-
OIDC
- to adhere to the OIDC specification for JWT processing -
JAR
- to adhere to the JAR specification for JWT processing
This table summarizes the differences between the rules that need to be adhered to in each case.
Table 1. Specification Rules OIDC specification JAR specification Request object
May be unsigned.
Authorization request parameters
Assembles parameters from both the request object and the query parameters.
If duplicates exist, the request object parameter takes precedence.
Assembles parameters from the request object ONLY.
Duplicates that are defined as query parameters are ignored.
Required request parameters
-
client_id
-
response_type
-
scope
, includingopenid
scope value
-
client_id
(must match the client ID specified in the request itself) -
request
ORrequest_uri
Default value:
OIDC
amster
attribute:requestObjectProcessing
-
- PAR Request URI Lifetime (seconds)
-
The length of time that the PAR Request URI is valid, in seconds.
It is strongly recommended to set this value to a short interval; for example, between 5 and 150 seconds. Setting this attribute to a higher value increases the load on the CTS, and may even result in denial of service if the requests are large and consume the available storage capacity.
For information about the PAR flow, refer to Authorization code grant with PAR.
Default value:
90
amster
attribute:parRequestUriLifetime
- Require Pushed Authorization Requests
-
If enabled, clients must use the PAR endpoint to initiate authorization requests, otherwise Identity Cloud returns an error indicating a missing or invalid request object.
This applies to all clients, including clients that are not configured to require PAR.
Alternatively, you can set this independently for individual clients. To access the client application settings in the AM admin UI, go to Realms > Realm Name > Applications > OAuth 2.0 > Clients > Client ID.
Default value:
false
amster
attribute:requirePushedAuthorizationRequests
- Refresh Token Grace Period (seconds)
-
The time, in seconds, that a refresh token can be reused. This grace period lets OAuth 2.0 clients recover seamlessly, if the response from an original refresh token request is not received, because of a network problem or other transient issue. During the grace period, the refresh token can be reused multiple times, if the network problem persists. When the grace period ends, the refresh token is revoked.
The refresh token grace period applies only to server-side tokens, in a one-to-one storage scheme.
Having a long grace period poses a security risk. You should therefore keep the grace period as small as possible. By default, the grace period cannot exceed 120 seconds. There is no grace period by default, so the default value is
0
.
- Allow Client Credentials in Token Endpoint Query Parameters
-
When this setting is
true
, you can include client credentials in token endpoint requests as query parameters.Previously, you could supply client credentials (the
client_id
andclient_secret
) as query parameters in POST requests to the/oauth2/access_token
endpoint. This is now prohibited by default and you must include the credentials within the POST request body.The Allow Client Credentials in Token Endpoint Query Parameters setting controls this behavior. For security reasons, ForgeRock recommends you keep this property disabled to prevent client credentials from being included as query parameters.
If you set this property to
true
to support existing scripts and clients, you should update your scripts and clients as soon as possible then set the property back tofalse
.Default value:
false
amster
attribute:allowClientCredentialsInTokenRequestQueryParameters
Client Dynamic Registration
The following settings appear on the Client Dynamic Registration tab:
- Require Software Statement for Dynamic Client Registration
-
When enabled, a software statement JWT containing at least the
iss
(issuer) claim must be provided when registering an OAuth 2.0 client dynamically.amster
attribute:dynamicClientRegistrationSoftwareStatementRequired
- Required Software Statement Attested Attributes
-
The client attributes that are required to be present in the software statement JWT when registering an OAuth 2.0 client dynamically. Only applies if Require Software Statements for Dynamic Client Registration is enabled.
Leave blank to allow any attributes to be present.
amster
attribute:requiredSoftwareStatementAttestedAttributes
- Allow Open Dynamic Client Registration
-
Allow clients to register without an access token. If enabled, consider adding some form of rate limiting. For details, refer to Client Registration in the OIDC specification.
amster
attribute:allowDynamicRegistration
- Generate Registration Access Tokens
-
Whether to generate Registration Access Tokens for clients that register by using open dynamic client registration. Such tokens let the client access the Client Configuration Endpoint as per the OpenID Connect specification. This setting has no effect if Allow Open Dynamic Client Registration is disabled.
amster
attribute:generateRegistrationAccessTokens
- Scope to give access to dynamic client registration
-
Mandatory scope required when registering a new OAuth2 client.
amster
attribute:dynamicClientRegistrationScope
OpenID Connect
The following settings appear on the OpenID Connect tab:
- Overrideable Id_Token Claims
-
List of claims in the ID token that can be overridden in the OIDC claims script. These should be the subset of the core OIDC claims, such as
aud
orazp
.-
For information about the core OIDC claims, refer to the ID Token data structure.
-
For details of the OIDC script and how to implement a custom scripted plugin, refer to OpenID Connect 1.0 (OIDC) claims.
-
To override claims, follow the steps described in How do I override claims in the OIDC ID token in Identity Cloud or AM 7.1.x?
You can override this setting for individual clients. To access the client application settings in the AM admin UI, go to [.label]#Realms > _Realm Name_ > Applications > OAuth 2.0 > Clients > _Client ID_#.
amster
attribute:overrideableOIDCClaims
-
- ID Token Signing Algorithms supported
-
Algorithms supported to sign OIDC
id_tokens
.Identity Cloud supports signing algorithms listed in JSON Web Algorithms (JWA): "alg" (Algorithm) Header Parameter Values for JWS:
-
HS256
- HMAC with SHA-256. -
HS384
- HMAC with SHA-384. -
HS512
- HMAC with SHA-512. -
ES256
- ECDSA with SHA-256 and NIST standard P-256 elliptic curve. -
ES384
- ECDSA with SHA-384 and NIST standard P-384 elliptic curve. -
ES512
- ECDSA with SHA-512 and NIST standard P-521 elliptic curve. -
RS256
- RSASSA-PKCS-v1_5 using SHA-256. -
RS384
- RSASSA-PKCS-v1_5 using SHA-384. -
RS512
- RSASSA-PKCS-v1_5 using SHA-512. -
PS256
- RSASSA-PSS using SHA-256. -
PS384
- RSASSA-PSS using SHA-384. -
PS512
- RSASSA-PSS using SHA-512.
amster
attribute:supportedIDTokenSigningAlgorithms
-
- ID Token Encryption Algorithms supported
-
Encryption algorithms supported to encrypt OIDC ID tokens to hide their contents.
Identity Cloud supports the following ID token encryption algorithms:
-
RSA-OAEP
- RSA with Optimal Asymmetric Encryption Padding (OAEP) with SHA-1 and MGF-1. -
RSA-OAEP-256
- RSA with OAEP with SHA-256 and MGF-1. -
A128KW
- AES Key Wrapping with 128-bit key derived from the client secret. -
RSA1_5
- RSA with PKCS#1 v1.5 padding. -
A256KW
- AES Key Wrapping with 256-bit key derived from the client secret. -
dir
- Direct encryption with AES using the hashed client secret. -
A192KW
- AES Key Wrapping with 192-bit key derived from the client secret.
amster
attribute:supportedIDTokenEncryptionAlgorithms
-
- ID Token Encryption Methods supported
-
Encryption methods supported to encrypt OpenID Connect ID tokens in order to hide its contents.
Identity Cloud supports the following ID token encryption algorithms:
-
A128GCM
,A192GCM
, andA256GCM
- AES in Galois Counter Mode (GCM) authenticated encryption mode. -
A128CBC-HS256
,A192CBC-HS384
, andA256CBC-HS512
- AES encryption in CBC mode, with HMAC-SHA-2 for integrity.
amster
attribute:supportedIDTokenEncryptionMethods
-
- Supported Claims
-
Set of claims supported by the OIDC
/oauth2/userinfo
endpoint, with translations.Claims may be entered as simple strings or pipe separated strings representing the internal claim name, locale, and localized description.
For example:
name|en|Your full name.
.Locale strings are in the format:
language + "" + country + "" + variant
, for exampleen
,en_GB
, oren_US_WIN
. If the locale and pipe is omitted, the description is displayed to all users that have undefined locales.If the description is also omitted, nothing is displayed on the consent page for the claim. For example specifying
family_name|
would allow the claimfamily_name
to be used by the client, but would not display it to the user on the consent page when requested.amster
attribute:supportedClaims
- OpenID Connect JWT Token Lifetime (seconds)
-
The amount of time the JWT will be valid for, in seconds.
amster
attribute:jwtTokenLifetime
- OIDC Provider Discovery
-
Turns on and off OIDC Discovery endpoint.
amster
attribute:oidcDiscoveryEndpointEnabled
Advanced OpenID Connect
The following settings appear on the Advanced OpenID Connect tab:
- Remote JSON Web Key URL
-
The Remote URL where the provider’s JSON Web Key can be retrieved.
If this setting is not configured, Identity Cloud provides a local URL to access the public key of the private key used to sign ID tokens.
amster
attribute:jkwsURI
- Idtokeninfo Endpoint Requires Client Authentication
-
When enabled, the
/oauth2/idtokeninfo
endpoint requires client authentication if the signing algorithm is set toHS256
,HS384
, orHS512
.amster
attribute:idTokenInfoClientAuthenticationEnabled
- Enable "claims_parameter_supported"
-
If enabled, clients will be able to request individual claims using the
claims
request parameter, as per section 5.5 of the OpenID Connect specification.amster
attribute:claimsParameterSupported
- OpenID Connect acr_values to Auth Mapping
-
Maps OIDC ACR values to authentication journeys. For details, refer to the acr_values parameter in the OIDC authentication request specification.
Do not configure more than one ACR mapping to the same authentication journey. Doing so can result in misrepresentation of the ACR information in the issued ID token. amster
attribute:loaMapping
- Default ACR values
-
Default requested Authentication Context Class Reference values.
List of strings that specifies the default acr values that the OP is being requested to use for processing requests from this Client, with the values appearing in order of preference. The Authentication Context Class satisfied by the authentication performed is returned as the acr Claim Value in the issued ID Token. The acr Claim is requested as a Voluntary Claim by this parameter. The acr_values_supported discovery element contains a list of the acr values supported by this server. Values specified in the acr_values request parameter or an individual acr Claim request override these default values.
amster
attribute:defaultACR
- OpenID Connect id_token amr Values to Auth Module Mappings
-
Specify the
amr
values returned in the OIDCid_token
. When authentication completes, the journey that was used is mapped to theamr
value. If you do not requireamr
values or are not providing OIDC tokens, leave this field blank.amster
attribute:amrMappings
- Always Return Claims in ID Tokens
-
If enabled, include scope-derived claims in the
id_token
, even if an access token is also returned that could provide access to get the claims from theuserinfo
endpoint.If not enabled, if an access token is requested the client must use it to access the
userinfo
endpoint for scope-derived claims, as they will not be included in the ID token.amster
attribute:alwaysAddClaimsToToken
- Enable Session Management
-
If this is disabled, OIDC session management related-endpoints are disabled. When enabled Identity Cloud stores ops tokens corresponding to OIDC sessions in the CTS store and an OIDC session ID in the session.
amster
attribute:storeOpsTokens
- Request Parameter Signing Algorithms Supported
-
Algorithms supported to verify signature of Request parameter. Identity Cloud supports signing algorithms listed in JSON Web Algorithms (JWA): "alg" (Algorithm) Header Parameter Values for JWS:
-
HS256
- HMAC with SHA-256. -
HS384
- HMAC with SHA-384. -
HS512
- HMAC with SHA-512. -
ES256
- ECDSA with SHA-256 and NIST standard P-256 elliptic curve. -
ES384
- ECDSA with SHA-384 and NIST standard P-384 elliptic curve. -
ES512
- ECDSA with SHA-512 and NIST standard P-521 elliptic curve. -
RS256
- RSASSA-PKCS-v1_5 using SHA-256.
amster
attribute:supportedRequestParameterSigningAlgorithms
-
- Request Parameter Encryption Algorithms Supported
-
Encryption algorithms supported to decrypt Request parameter.
Identity Cloud supports the following ID token encryption algorithms:
-
RSA-OAEP
- RSA with Optimal Asymmetric Encryption Padding (OAEP) with SHA-1 and MGF-1. -
RSA-OAEP-256
- RSA with OAEP with SHA-256 and MGF-1. -
A128KW
- AES Key Wrapping with 128-bit key derived from the client secret. -
RSA1_5
- RSA with PKCS#1 v1.5 padding. -
A256KW
- AES Key Wrapping with 256-bit key derived from the client secret. -
dir
- Direct encryption with AES using the hashed client secret. -
A192KW
- AES Key Wrapping with 192-bit key derived from the client secret.
amster
attribute:supportedRequestParameterEncryptionAlgorithms
-
- Request Parameter Encryption Methods Supported
-
Encryption methods supported to decrypt Request parameter.
Identity Cloud supports the following Request parameter encryption algorithms:
-
A128GCM
,A192GCM
, andA256GCM
- AES in Galois Counter Mode (GCM) authenticated encryption mode. -
A128CBC-HS256
,A192CBC-HS384
, andA256CBC-HS512
- AES encryption in CBC mode, with HMAC-SHA-2 for integrity.
amster
attribute:supportedRequestParameterEncryptionEnc
-
- Supported Token Endpoint JWS Signing Algorithms.
-
Supported JWS Signing Algorithms for 'private_key_jwt' JWT based authentication method.
amster
attribute:supportedTokenEndpointAuthenticationSigningAlgorithms
- Authorized OIDC SSO Clients
-
Clients authorized to use OpenID Connect ID tokens as SSO Tokens.
Allows clients to act with the full authority of the user. Grant this permission only to trusted clients.
amster
attribute:authorisedOpenIdConnectSSOClients
- UserInfo Signing Algorithms Supported
-
Algorithms supported to verify signature of the UserInfo endpoint. Identity Cloud supports the signing algorithms listed in JSON Web Algorithms (JWA): "alg" (Algorithm) Header Parameter Values for JWS:
-
HS256
- HMAC with SHA-256. -
HS384
- HMAC with SHA-384. -
HS512
- HMAC with SHA-512. -
ES256
- ECDSA with SHA-256 and NIST standard P-256 elliptic curve. -
ES384
- ECDSA with SHA-384 and NIST standard P-384 elliptic curve. -
ES512
- ECDSA with SHA-512 and NIST standard P-521 elliptic curve. -
RS256
- RSASSA-PKCS-v1_5 using SHA-256.
amster
attribute:supportedUserInfoSigningAlgorithms
-
- UserInfo Encryption Algorithms Supported
-
Encryption algorithms supported by the UserInfo endpoint.
Identity Cloud supports the following UserInfo endpoint encryption algorithms:
-
RSA-OAEP
- RSA with Optimal Asymmetric Encryption Padding (OAEP) with SHA-1 and MGF-1. -
RSA-OAEP-256
- RSA with OAEP with SHA-256 and MGF-1. -
A128KW
- AES Key Wrapping with 128-bit key derived from the client secret. -
RSA1_5
- RSA with PKCS#1 v1.5 padding. -
A256KW
- AES Key Wrapping with 256-bit key derived from the client secret. -
dir
- Direct encryption with AES using the hashed client secret. -
A192KW
- AES Key Wrapping with 192-bit key derived from the client secret.
amster
attribute:supportedUserInfoEncryptionAlgorithms
-
- UserInfo Encryption Methods Supported
-
Encryption methods supported by the UserInfo endpoint.
Identity Cloud supports the following UserInfo endpoint encryption methods:
-
A128GCM
,A192GCM
, andA256GCM
- AES in Galois Counter Mode (GCM) authenticated encryption mode. -
A128CBC-HS256
,A192CBC-HS384
, andA256CBC-HS512
- AES encryption in CBC mode, with HMAC-SHA-2 for integrity.
amster
attribute:supportedUserInfoEncryptionEnc
-
- Token Introspection Response Signing Algorithms Supported
-
Algorithms that are supported for signing the Token Introspection endpoint JWT response.
Identity Cloud supports the signing algorithms listed in JSON Web Algorithms (JWA): "alg" (Algorithm) Header Parameter Values for JWS:
-
HS256
- HMAC with SHA-256. -
HS384
- HMAC with SHA-384. -
HS512
- HMAC with SHA-512. -
ES256
- ECDSA with SHA-256 and NIST standard P-256 elliptic curve. -
ES384
- ECDSA with SHA-384 and NIST standard P-384 elliptic curve. -
ES512
- ECDSA with SHA-512 and NIST standard P-521 elliptic curve. -
RS256
- RSASSA-PKCS-v1_5 using SHA-256. -
RS384
- RSASSA-PKCS-v1_5 using SHA-384. -
RS512
- RSASSA-PKCS-v1_5 using SHA-512. -
EdDSA
- EdDSA with SHA-512.
amster
attribute:supportedTokenIntrospectionResponseSigningAlgorithms
-
- Token Introspection Response Encryption Algorithms Supported
-
Encryption algorithms supported by the Token Introspection endpoint JWT response.
Identity Cloud supports the following UserInfo endpoint encryption algorithms:
-
RSA-OAEP
- RSA with Optimal Asymmetric Encryption Padding (OAEP) with SHA-1 and MGF-1. -
RSA-OAEP-256
- RSA with OAEP with SHA-256 and MGF-1. -
A128KW
- AES Key Wrapping with 128-bit key derived from the client secret. -
RSA1_5
- RSA with PKCS#1 v1.5 padding. -
A256KW
- AES Key Wrapping with 256-bit key derived from the client secret. -
dir
- Direct encryption with AES using the hashed client secret. -
A192KW
- AES Key Wrapping with 192-bit key derived from the client secret.
amster
attribute:supportedTokenIntrospectionResponseEncryptionAlgorithms
-
- Token Introspection Response Encryption Methods Supported
-
Encryption methods supported by the Token Introspection endpoint JWT response.
Identity Cloud supports the following encryption methods:
-
A128GCM
,A192GCM
, andA256GCM
- AES in Galois Counter Mode (GCM) authenticated encryption mode. -
A128CBC-HS256
,A192CBC-HS384
, andA256CBC-HS512
- AES encryption in CBC mode, with HMAC-SHA-2 for integrity.
amster
attribute:supportedTokenIntrospectionResponseEncryptionEnc
-
- Authorization Response Signing Algorithms Supported
-
Algorithms supported for signing the /oauth2/authorize endpoint JWT response.
Identity Cloud supports the signing algorithms listed in JSON Web Algorithms (JWA): "alg" (Algorithm) Header Parameter Values for JWS:
-
HS256
- HMAC with SHA-256 -
HS384
- HMAC with SHA-384 -
HS512
- HMAC with SHA-512 -
RS256
- RSASSA-PKCS-v1_5 using SHA-256 -
RS384
- RSASSA-PKCS1-v1_5 using SHA-384 -
RS512
- RSASSA-PKCS1-v1_5 using SHA-512 -
ES256
- ECDSA with SHA-256 and NIST standard P-256 elliptic curve -
ES384
- ECDSA with SHA-384 and NIST standard P-384 elliptic curve -
ES512
- ECDSA with SHA-512 and NIST standard P-521 elliptic curve -
PS256
- RSASSA-PSS using SHA-256 and MGF1 with SHA-256 -
PS384
- RSASSA-PSS using SHA-384 and MGF1 with SHA-384 -
PS512
- RSASSA-PSS using SHA-512 and MGF1 with SHA-512
Default value:
PS384 ES384 RS384 HS256 HS512 ES256 RS256 HS384 ES512 PS256 PS512 RS512
amster
attribute:supportedAuthorizationResponseSigningAlgorithms
-
- Authorization Response Encryption Algorithms Supported
-
Algorithms supported for encrypting the /oauth2/authorize JWT response.
Identity Cloud supports the following Token Introspection endpoint encryption algorithms:
-
RSA1_5
- RSA with PKCS#1 v1.5 padding. -
RSA-OAEP
- RSA with Optimal Asymmetric Encryption Padding (OAEP) with SHA-1 and MGF-1. -
RSA-OAEP-256
- RSA with OAEP with SHA-256 and MGF-1. -
A128KW
- AES Key Wrapping with 128-bit key derived from the client secret. -
A192KW
- AES Key Wrapping with 192-bit key derived from the client secret. -
A256KW
- AES Key Wrapping with 256-bit key derived from the client secret. -
dir
- Direct encryption with AES using the hashed client secret. -
ECDH-ES
- Elliptic Curve Diffie-Hellman Ephemeral Static key agreement using Concat KDF. -
ECDH-ES+A128KW
- ECDH-ES using Concat KDF and CEK wrapped withA128KW
. -
ECDH-ES+A192KW
- ECDH-ES using Concat KDF and CEK wrapped withA192KW
. -
ECDH-ES+A256KW
- ECDH-ES using Concat KDF and CEK wrapped withA256KW
.
Default value:
ECDH-ES+A256KW ECDH-ES+A192KW RSA-OAEP ECDH-ES+A128KW RSA-OAEP-256 A128KW A256KW ECDH-ES dir A192KW
amster
attribute:supportedAuthorizationResponseEncryptionAlgorithms
-
- Authorization Response Encryption Methods Supported
-
Methods supported for encrypting the /oauth2/authorize JWT response.
Identity Cloud supports the following encryption methods:
-
A128GCM
,A192GCM
, andA256GCM
- AES in Galois Counter Mode (GCM) authenticated encryption mode. -
A128CBC-HS256
,A192CBC-HS384
, andA256CBC-HS512
- AES encryption in CBC mode, with HMAC-SHA-2 for integrity.
Default value:
A256GCM A192GCM A128GCM A128CBC-HS256 A192CBC-HS384 A256CBC-HS512
amster
attribute:supportedAuthorizationResponseEncryptionEnc
-
- Include all kty and alg combinations in jwks_uri
-
By default only distinct kid entries are returned in the jwks_uri and the alg property is not included. Enabling this flag will result in duplicate kid entries, each one specifying a different kty and alg combination. RFC7517 distinct key KIDs
amster
attribute:includeAllKtyAlgCombinationsInJwksUri
Device Flow
The following settings appear on the Device Flow tab:
- Verification URL
-
The URL that the user will be instructed to visit to complete their OAuth 2.0 login and consent when using the device code flow.
amster
attribute:verificationUrl
- Device Completion URL
-
The URL that the user will be sent to on completion of their OAuth 2.0 login and consent when using the device code flow.
amster
attribute:completionUrl
- Device Code Lifetime (seconds)
-
The lifetime of the device code, in seconds.
amster
attribute:deviceCodeLifetime
- Device Polling Interval
-
The polling frequency for devices waiting for tokens when using the device code flow.
amster
attribute:devicePollInterval
- User Code Character Length
-
The number of characters in the generated user code.
Default value:
8
amster
attribute:deviceUserCodeLength
- User Code Character Set
-
The set of characters to be used to generate a user code.
Consider limitations of low resolution mobile devices when defining a character set. For example, the OAuth 2.0 Device Grant specification recommends removing characters that can be easily confused, such as "0" and "O" or "1", "l" and "I". Refer to RFC 8628 for further examples.
Default value:
234567ACDEFGHJKLMNPQRSTWXYZabcdefhijkmnopqrstwxyz
amster
attribute:deviceUserCodeCharacterSet
Consent
The following settings appear on the Consent tab:
- Saved Consent Attribute Name
-
Name of a multi-valued attribute on resource owner profiles where Identity Cloud can save authorization consent decisions.
When the resource owner chooses to save the decision to authorize access for a client application, Identity Cloud updates the resource owner’s profile to avoid having to prompt the resource owner to grant authorization when the client issues subsequent authorization requests.
amster
attribute:savedConsentAttribute
- Allow Clients to Skip Consent
-
If enabled, clients may be configured so that the resource owner will not be asked for consent during authorization flows.
You can override this setting for individual clients. To access the client application settings in the AM admin UI, go to [.label]#Realms > _Realm Name_ > Applications > OAuth 2.0 > Clients > _Client ID_#.
amster
attribute:clientsCanSkipConsent
- Enable Remote Consent
-
Enables consent to be gathered by a separate service.
You can override this setting for individual clients. To access the client application settings in the AM admin UI, go to [.label]#Realms > _Realm Name_ > Applications > OAuth 2.0 > Clients > _Client ID_#.
amster
attribute: enableRemoteConsent
- Remote Consent Service ID
-
The ID of an existing remote consent service agent.
You can override this setting for individual clients. To access the client application settings in the AM admin UI, go to [.label]#Realms > _Realm Name_ > Applications > OAuth 2.0 > Clients > _Client ID_#.
The possible values for this property are:
-
[Empty]
amster
attribute:remoteConsentServiceId
-
- Remote Consent Service Request Signing Algorithms Supported
-
Algorithms supported to sign consent_request JWTs for Remote Consent Services.
Identity Cloud supports the signing algorithms listed in JSON Web Algorithms (JWA): "alg" (Algorithm) Header Parameter Values for JWS:
-
HS256
- HMAC with SHA-256. -
HS384
- HMAC with SHA-384. -
HS512
- HMAC with SHA-512. -
ES256
- ECDSA with SHA-256 and NIST standard P-256 elliptic curve. -
ES384
- ECDSA with SHA-384 and NIST standard P-384 elliptic curve. -
ES512
- ECDSA with SHA-512 and NIST standard P-521 elliptic curve. -
RS256
- RSASSA-PKCS-v1_5 using SHA-256.
amster
attribute:supportedRcsRequestSigningAlgorithms
-
- Remote Consent Service Request Encryption Algorithms Supported
-
Encryption algorithms supported to encrypt Remote Consent Service requests.
Identity Cloud supports the following encryption algorithms:
-
RSA1_5
- RSA with PKCS#1 v1.5 padding. -
RSA-OAEP
- RSA with Optimal Asymmetric Encryption Padding (OAEP) with SHA-1 and MGF-1. -
RSA-OAEP-256
- RSA with OAEP with SHA-256 and MGF-1. -
A128KW
- AES Key Wrapping with 128-bit key derived from the client secret. -
A192KW
- AES Key Wrapping with 192-bit key derived from the client secret. -
A256KW
- AES Key Wrapping with 256-bit key derived from the client secret. -
dir
- Direct encryption with AES using the hashed client secret.
amster
attribute:supportedRcsRequestEncryptionAlgorithms
-
- Remote Consent Service Request Encryption Methods Supported
-
Encryption methods supported to encrypt Remote Consent Service requests.
Identity Cloud supports the following encryption methods:
-
A128GCM
,A192GCM
, andA256GCM
- AES in Galois Counter Mode (GCM) authenticated encryption mode. -
A128CBC-HS256
,A192CBC-HS384
, andA256CBC-HS512
- AES encryption in CBC mode, with HMAC-SHA-2 for integrity.
amster
attribute:supportedRcsRequestEncryptionMethods
-
- Remote Consent Service Response Signing Algorithms Supported
-
Algorithms supported to verify signed consent_response JWT from Remote Consent Services.
Identity Cloud supports the signing algorithms listed in JSON Web Algorithms (JWA): "alg" (Algorithm) Header Parameter Values for JWS:
-
HS256
- HMAC with SHA-256. -
HS384
- HMAC with SHA-384. -
HS512
- HMAC with SHA-512. -
ES256
- ECDSA with SHA-256 and NIST standard P-256 elliptic curve. -
ES384
- ECDSA with SHA-384 and NIST standard P-384 elliptic curve. -
ES512
- ECDSA with SHA-512 and NIST standard P-521 elliptic curve. -
RS256
- RSASSA-PKCS-v1_5 using SHA-256.
amster
attribute:supportedRcsResponseSigningAlgorithms
-
- Remote Consent Service Response Encryption Algorithms Supported
-
Encryption algorithms supported to decrypt Remote Consent Service responses.
Identity Cloud supports the following encryption algorithms:
-
RSA1_5
- RSA with PKCS#1 v1.5 padding. -
RSA-OAEP
- RSA with Optimal Asymmetric Encryption Padding (OAEP) with SHA-1 and MGF-1. -
RSA-OAEP-256
- RSA with OAEP with SHA-256 and MGF-1. -
A128KW
- AES Key Wrapping with 128-bit key derived from the client secret. -
A192KW
- AES Key Wrapping with 192-bit key derived from the client secret. -
A256KW
- AES Key Wrapping with 256-bit key derived from the client secret. -
dir
- Direct encryption with AES using the hashed client secret.
amster
attribute:supportedRcsResponseEncryptionAlgorithms
-
- Remote Consent Service Response Encryption Methods Supported
-
Encryption methods supported to decrypt Remote Consent Service responses.
Identity Cloud supports the following encryption methods:
-
A128GCM
,A192GCM
, andA256GCM
- AES in Galois Counter Mode (GCM) authenticated encryption mode. -
A128CBC-HS256
,A192CBC-HS384
, andA256CBC-HS512
- AES encryption in CBC mode, with HMAC-SHA-2 for integrity.
amster
attribute:supportedRcsResponseEncryptionMethods
-
CIBA
The following settings appear on the CIBA tab:
- Back Channel Authentication ID Lifetime (seconds)
-
The time back channel authentication request id is valid for, in seconds.
amster
attribute:cibaAuthReqIdLifetime
- Polling Wait Interval (seconds)
-
The minimum amount of time in seconds that the Client should wait between polling requests to the token endpoint
amster
attribute:cibaMinimumPollingInterval
- Signing Algorithms Supported
-
Algorithms supported to sign the CIBA request parameter.
Identity Cloud supports the signing algorithms listed in JSON Web Algorithms (JWA): "alg" (Algorithm) Header Parameter Values for JWS:
-
ES256
- ECDSA with SHA-256 and NIST standard P-256 elliptic curve. -
PS256
- RSASSA-PSS using SHA-256.
amster
attribute:supportedCibaSigningAlgorithms
-
Plugins
The Plugins settings are used to configure the following supported OAuth2 plugin extension points:
Each plugin is configured using three different attributes:
-
Plugin Type
:This value can be either
SCRIPTED
to run a custom script, orJAVA
for a custom implementation class. -
Script
:The script that is run for
SCRIPTED
plugin types. -
Implementation Class
:The class that is invoked for
JAVA
plugin types. The class must implement the appropriate Java interface in theorg.forgerock.oauth2.core.plugins
package for the plugin.You can override this setting for individual clients. To access the client application settings in the AM admin UI, go to [.label]#Realms > _Realm Name_ > Applications > OAuth 2.0 > Clients > _Client ID_#.
The following settings appear on the Plugins tab:
- Access Token Modification Plugin Type
-
Default value:
SCRIPTED
amster
attribute:accessTokenModificationPluginType
- Access Token Modification Script
-
This script is run when issuing an access token. The script lets you modify the token, for example, by altering the data fields, before it is persisted or returned to the client.
The script is run if
Access Token Modification Plugin Type
is set toSCRIPTED
.Refer to Access tokens.
Default value:
Alpha OAuth2 Access Token Modification Script
amster
attribute:accessTokenModificationScript
- Access Token Modifier Plugin Implementation Class
-
The Java class that provides the custom implementation for the access token modifier plugin interface,
org.forgerock.oauth2.core.plugins.AccessTokenModifier
. This class is invoked whenAccess Token Modification Plugin Type
is set toJAVA
.Default value:
org.forgerock.openam.oauth2.OpenAMScopeValidator
amster
attribute:accessTokenModificationClass
- OIDC Claims Plugin Type
-
Default value:
SCRIPTED
amster
attribute:oidcClaimsPluginType
- OIDC Claims Script
-
This script is run when issuing an ID token or during a request to the
/userinfo
OpenID Connect endpoint. Use this script to retrieve claim values based on an issued access token.The script is run if
OIDC Claims Plugin Type
is set toSCRIPTED
.Default value:
Alpha OIDC Claims Script
amster
attribute:oidcClaimsScript
- OIDC Claims Plugin Implementation Class
-
The Java class that provides the custom implementation for the OIDC claims plugin interface,
org.forgerock.oauth2.core.plugins.UserInfoClaimsPlugin
. This class is invoked whenOIDC Claims Plugin Type
is set toJAVA
.Default value:
org.forgerock.openam.oauth2.OpenAMScopeValidator
amster
attribute:oidcClaimsClass
- Scope Evaluation Plugin Type
-
Default value:
JAVA
amster
attribute:evaluateScopePluginType
- Scope Evaluation Script
-
This script retrieves and evaluates the scope information for an OAuth2 access token.
The script lets you populate the scopes with profile attribute values. For example, if one of the scopes is
mail
, Identity Cloud setsmail
to the resource owner’s email address in the token information returned.Default value:
--- Select a script ---
amster
attribute:evaluateScopeScript
- Scope Evaluation Plugin Implementation Class
-
The Java class that provides the custom implementation for the evaluate scope plugin interface:
org.forgerock.oauth2.core.plugins.ScopeEvaluator
.Default value:
org.forgerock.openam.oauth2.OpenAMScopeValidator
amster
attribute:evaluateScopeClass
- Scope Validation Plugin Type
-
Default value:
JAVA
amster
attribute:validateScopePluginType
- Scope Validation Script
-
This script validates and customizes the set of requested scopes for authorize, access token, refresh token, and backchannel authorize requests.
Default value:
--- Select a script ---
amster
attribute:validateScopeScript
- Scope Validation Plugin Implementation Class
-
The Java class that provides the custom implementation for the evaluate scope plugin interface:
org.forgerock.oauth2.core.plugins.ScopeValidator
.Default value:
org.forgerock.openam.oauth2.OpenAMScopeValidator
amster
attribute:validateScopeClass
- Authorize Endpoint Data Provider Plugin Type
-
Default value:
JAVA
amster
attribute:authorizeEndpointDataProviderPluginType
- Authorize Endpoint Data Provider Script
-
Use this script to retrieve additional data from an authorization request, such as data from the user’s session or from an external service.
Default value:
--- Select a script ---
amster
attribute:authorizeEndpointDataProviderScript
- Authorize Endpoint Data Provider Plugin Implementation Class
-
The Java class that provides the custom implementation for the authorize endpoint data provider plugin interface:
org.forgerock.oauth2.core.plugins.AuthorizeEndpointDataProvider
.Default value:
org.forgerock.openam.oauth2.OpenAMScopeValidator
amster
attribute:authorizeEndpointDataProviderClass
- Access Token Enricher Plugin Implementation Class
-
The class that provides the custom implementation for the access token enricher plugin interface.
The access token enricher plugin interface is deprecated and will be removed in a future release.
Default value:
org.forgerock.openam.oauth2.OpenAMScopeValidator
amster
attribute:accessTokenEnricherClass
OneSpan Configuration
The following settings are available in this service:
- OneSpan IAA user name
-
OneSpan IAA user name
- OneSpan IAA Environment
-
OneSpan IAA Environment
The possible values for this property are:
-
sdb
-
prod
-
- Application Reference
-
A descriptive value for the integrated application
Policy Configuration
The following settings are available in this service:
- Primary LDAP Server
-
Configuration directory server host:port that Identity Cloud searches for policy information.
Format:
local Identity Cloud server name | hostname:port
Multiple entries must be prefixed by local server name. Make sure to place the multiple entries on a single line and separate the hostname:port URLs with a space.
For example, openam.example.com|opendj.example.com:1389 opendj.example.com:2389
Default value:
userstore-1.userstore:1389 userstore-0.userstore:1389 userstore-2.userstore:1389
- LDAP Users Base DN
-
Base DN for LDAP Users subject searches.
Default value:
ou=identities
- LDAP Bind DN
-
Bind DN to connect to the directory server for policy information.
Default value:
&{am.stores.user.username}
- LDAP Bind Password
-
Bind password to connect to the directory server for policy information.
Default value:
{ "$string": "&{am.stores.user.password}" }
- LDAP Organization Search Filter
-
Search filter to match organization entries.
Default value:
(objectclass=sunismanagedorganization)
- LDAP Users Search Filter
-
Search filter to match user entries.
Default value:
(objectclass=inetorgperson)
- LDAP Users Search Scope
-
Search scope to find user entries.
The possible values for this property are:
-
SCOPE_BASE
-
SCOPE_ONE
-
SCOPE_SUB
Default value:
SCOPE_SUB
-
- LDAP Users Search Attribute
-
Naming attribute for user entries.
Default value:
uid
- Maximum Results Returned from Search
-
Search limit for LDAP searches.
Default value:
100
- Search Timeout
-
Time after which Identity Cloud returns an error for an incomplete search, in seconds.
Default value:
5
- LDAP SSL/TLS
-
If enabled, Identity Cloud connects securely to the directory server. This requires that you install the directory server certificate.
Default value:
{ "$bool": "&{am.stores.ssl.enabled}" }
- LDAP Connection Pool Minimum Size
-
Minimum number of connections in the pool.
Default value:
1
- LDAP Connection Pool Maximum Size
-
Maximum number of connections in the pool.
Default value:
10
- Heartbeat Interval
-
Specifies how often should Identity Cloud send a heartbeat request to the directory.
Use this option in case a firewall/loadbalancer can close idle connections, since the heartbeat requests will ensure that the connections won’t become idle.
Default value:
10
- Heartbeat Unit
-
Defines the time unit corresponding to the Heartbeat Interval setting.
Use this option in case a firewall/loadbalancer can close idle connections, since the heartbeat requests will ensure that the connections won’t become idle.
The possible values for this property are:
-
Label: second (Value:
SECONDS
) -
Label: minute (Value:
MINUTES
) -
Label: hour (Value:
HOURS
)
Default value:
SECONDS
-
- Subjects Result Time to Live
-
Maximum time that Identity Cloud caches a subject result for evaluating policy requests, in minutes. A value of
0
prevents Identity Cloud from caching subject evaluations for policy decisions.Default value:
10
- User Alias
-
If enabled, Identity Cloud can evaluate policy for remote users aliased to local users.
Default value:
false
- Check resources exist when Resource Server is updated
-
Check all registered resources exist when updating Resource Server.
Policy Set will check each registered Resource Types one by one against config datastore if enabled. Consider disabling this option if you have large number of Resource Types registered to a Policy Set.
Default value:
true
Push Notification Service
The following settings are available in this service:
- SNS Access Key ID
-
Amazon Simple Notification Service Access Key ID. For more information, refer to Create an AWS (Push Auth) Credential in the ForgeRock Knowledge Base.
For example, you might set this property to: AKIAIOSFODNN7EXAMPLE
amster
attribute:accessKey
- SNS Access Key Secret
-
Amazon Simple Notification Service Access Key Secret. For more information, refer to Create an AWS (Push Auth) Credential in the ForgeRock Knowledge Base.
amster
attribute:secret
- SNS Endpoint for APNS
-
The Simple Notification Service endpoint in Amazon Resource Name format, used to send push messages to the Apple Push Notification Service (APNS).
For example, you might set this property to: arn:aws:sns:us-east-1:1234567890:app/APNS/production
amster
attribute:appleEndpoint
- SNS Endpoint for GCM
-
The Simple Notification Service endpoint in Amazon Resource Name format, used to send push messages over Google Cloud Messaging (GCM).
For example, you might set this property to: arn:aws:sns:us-east-1:1234567890:app/GCM/production
amster
attribute:googleEndpoint
- SNS Client Region
-
Region of your registered Amazon Simple Notification Service client. For more information, refer to https://docs.aws.amazon.com/general/latest/gr/rande.html.
The possible values for this property are:
-
us-gov-west-1
-
us-east-1
-
us-west-1
-
us-west-2
-
eu-west-1
-
eu-central-1
-
ap-southeast-1
-
ap-southeast-2
-
ap-northeast-1
-
ap-northeast-2
-
sa-east-1
-
n-north-1
amster
attribute:region
-
- Message Transport Delegate Factory
-
The fully qualified class name of the factory responsible for creating the PushNotificationDelegate. The class must implement
org.forgerock.openam.services.push.PushNotificationDelegate
.amster
attribute:delegateFactory
- Response Cache Duration
-
The minimum lifetime to keep unanswered message records in the message dispatcher cache, in seconds. To keep unanswered message records indefinitely, set this property to
0
.Should be tuned so that it is applicable to the use case of this service. For example, the ForgeRock Authenticator (Push) authentication module has a default timeout of 120 seconds.amster
attribute:mdDuration
- Response Cache Concurrency
-
Level of concurrency to use when accessing the message dispatcher cache. Must be greater than
0
. Choose a value to accommodate as many threads as will ever concurrently access the message dispatcher cache.amster
attribute:mdConcurrency
- Response Cache Size
-
Maximum size of the message dispatcher cache, in number of records. If set to
0
the cache can grow indefinitely. If the number of records that need to be stored exceeds this maximum, then older items in the cache will be removed to make space.amster
attribute:mdCacheSize
Remote Consent Service
The following settings are available in this service:
- Client Name
-
The name used to identify this OAuth 2.0 remote consent service when referencedin other services.
amster
attribute:clientId
- Authorization Server jwk_uri
-
The jwk_uri for retrieving the authorization server signing and encryption keys.
amster
attribute:jwksUriAS
- JWK Store Cache Timeout (in minutes)
-
The cache timeout for the JWK store of the authorization server, in minutes.
amster
attribute:jwkStoreCacheTimeout
- JWK Store Cache Miss Cache Time (in minutes)
-
The length of time a cache miss is cached, in minutes.
amster
attribute:jwkStoreCacheMissCacheTime
- Consent Response Time Limit (in minutes)
-
The time limit set on the consent response JWT before it expires, in minutes.
amster
attribute:consentResponseTimeLimit
Session
Dynamic Attributes
The following settings appear on the Dynamic Attributes tab:
- Maximum Session Time
-
Maximum time a session can remain valid before Identity Cloud requires the user to authenticate again, in minutes.
amster
attribute:maxSessionTime
- Maximum Idle Time
-
Maximum time a server-side session can remain idle before Identity Cloud requires the user to authenticate again, in minutes.
amster
attribute:maxIdleTime
- Maximum Caching Time
-
Maximum time that external clients of AM are recommended to cache the session for, in minutes.
amster
attribute:maxCachingTime
- Active User Sessions
-
Maximum number of concurrent server-side sessions Identity Cloud allows a user to have.
amster
attribute:quotaLimit
Session Property Whitelist Service
The following settings are available in this service:
- Allowlisted Session Property Names
-
A list of properties that users may read, edit the value of, or delete from their session.
Adding properties to sessions can affect Identity Cloud’s performance because there is no size constraint limiting the set of properties you can add to sessions and no limit on the number of session properties you can add.
Protected attributes cannot be set, edited, or deleted, even if they are included in this allowlist. amster
attribute:sessionPropertyWhitelist
- Session Properties to return for session queries
-
A list of session properties that can be returned to admins in a REST session query response.
This setting may impact REST query performance - when session properties are added, the CTS token must be retrieved, and will be the subject of decryption and decompression, if configured.
Protected attributes will NOT be allowed to be set, edited or deleted, even if they are included in this list.
amster
attribute:whitelistedQueryProperties
Social Authentication Implementations
Realm Attributes
The following settings appear on the Realm Attributes tab:
- Enabled Implementations
-
Provide a key that has been used to define the settings above to enable that set of settings.
For example: google
Display Names
The display names for the implementations - this will be used to provide a name for the icon displayed on the login page. The key should be used across all the settings on this page to join them together.
For example:
Key |
Value |
Authentication Chains
The name of the authentication chains that are the entry points to being authenticated by each respective social authentication provider. The key should correspond to a key used to define a Display Name above.
For example:
Key |
Value |
socialAuthChainGoogle |
Icons
Either a full URL or a path relative to the base of the site/server where the image can be found. The image will be used on the login page to link to the authentication chain defined above. The key should correspond to a key used to define a Display Name above.
For example:
Key |
Value |
/images/google-sign-in.png |
Social Identity Provider Service
Configuration
The following settings appear on the Configuration tab:
- Enabled
-
amster
attribute:enabled
Secondary Configurations
This service has the following Secondary Configurations.
instagramConfig
- Enabled
-
amster
attribute:enabled
- Auth ID Key
-
Field used to identify a user by the social provider.
For example, you might set this property to: id
amster
attribute:authenticationIdKey
- Client ID
-
OAuth client_id parameter.
For more information on the OAuth client_id parameter, refer to RFC 6749, section 2.2.
amster
attribute:clientId
- Client Secret
-
OAuth client_secret parameter.
For more information on the OAuth client_secret parameter, refer to RFC 6749, section 2.3.1.
amster
attribute:clientSecret
- Authentication Endpoint URL
-
OAuth authentication endpoint URL.
This is the URL endpoint for OAuth authentication provided by the OAuth Identity Provider.
For example, you might set this property to: https://api.instagram.com/oauth/authorize/.
amster
attribute:authorizationEndpoint
- Access Token Endpoint URL
-
OAuth access token endpoint URL.
This is the URL endpoint for access token retrieval provided by the OAuth Identity Provider. Refer to RFC 6749, section 3.2.
For example, you might set this property to: https://api.instagram.com/oauth/access_token.
amster
attribute:tokenEndpoint
- User Profile Service URL
-
User profile information URL.
This URL endpoint provides user profile information and is provided by the OAuth Identity Provider. Note that this URL should return JSON objects in response.
For example, you might set this property to: https://graph.instagram.com/me?fields=id,username.
amster
attribute:userInfoEndpoint
- Token Introspection Endpoint URL
-
OAuth Token Introspection endpoint URL.
This is the URL endpoint for access token validation using the OAuth Identity Provider. Refer to RFC 7662.
For example, you might set this property to: https://graph.instagram.com/debug_token.
amster
attribute:introspectEndpoint
- Redirect URL
-
amster
attribute:redirectURI
- Redirect after form post URL
-
Specify URL to redirect the form post parameters to.
amster
attribute:redirectAfterFormPostURI
- Scope Delimiter
-
The delimiter used by an auth server to separate scopes.
amster
attribute:scopeDelimiter
- OAuth Scopes
-
List of user profile properties
According to the OAuth 2.0 Authorization Framework that the client application requires. The list depends on the permissions that the resource owner grants to the client application. Some authorization servers use non-standard separators for scopes.
For example, you might set this property to: user_profile
amster
attribute:scopes
- Client Authentication Method
-
Field used to define how the client would be identified by the social provider.
amster
attribute:clientAuthenticationMethod
- PKCE Method
-
The PKCE transformation method to use when making requests to the authorization endpoint.
amster
attribute:pkceMethod
- JWKS URI Endpoint
-
The JWKS URL endpoint for the RP to use when encrypting or validating
amster
attribute:jwksUriEndpoint
- JWT Signing Algorithm
-
The signing algorithm to use when signing the client assertion and request object jwt sent to social provider.
amster
attribute:jwtSigningAlgorithm
- JWT Encryption Algorithm
-
The encryption algorithm to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionAlgorithm
- JWT Encryption Method
-
The encryption method to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionMethod
- Private Key JWT Expiration Time (seconds)
-
The expiration time on or after which the private key JWT must not be accepted for processing.
amster
attribute:privateKeyJwtExpTime
- Response Mode
-
Informs the Authorization Server of the mechanism to use for returning Authorization Response parameters.
amster
attribute:responseMode
- UI Config Properties
-
Mapping of display properties to be defined and consumed by the UI.
amster
attribute:uiConfig
- Transform Script
-
A script that takes the raw profile object as input and outputs the normalized profile object.
amster
attribute:transform
googleConfig
- Enabled
-
amster
attribute:enabled
- Auth ID Key
-
Field used to identify a user by the social provider.
For example, you might set this property to: sub
amster
attribute:authenticationIdKey
- Authentication Endpoint URL
-
OAuth authentication endpoint URL.
This is the URL endpoint for OAuth authentication provided by the OAuth Identity Provider.
For example, you might set this property to: https://accounts.google.com/o/oauth2/v2/auth
amster
attribute:authorizationEndpoint
- Access Token Endpoint URL
-
OAuth access token endpoint URL.
This is the URL endpoint for access token retrieval provided by the OAuth Identity Provider. Refer to RFC 6749, section 3.2.
For example, you might set this property to: https://www.googleapis.com/oauth2/v4/token
amster
attribute:tokenEndpoint
- User Profile Service URL
-
User profile information URL.
This URL endpoint provides user profile information and is provided by the OAuth Identity Provider. Note that this URL should return JSON objects in response.
For example, you might set this property to: https://www.googleapis.com/oauth2/v3/userinfo
amster
attribute:userInfoEndpoint
- Token Introspection Endpoint URL
-
OAuth Token Introspection endpoint URL.
This is the URL endpoint for access token validation using the OAuth Identity Provider. Refer to RFC 7662.
amster
attribute:introspectEndpoint
- Redirect URL
-
amster
attribute:redirectURI
- Redirect after form post URL
-
Specify URL to redirect the form post parameters to.
amster
attribute:redirectAfterFormPostURI
- Scope Delimiter
-
The delimiter used by an auth server to separate scopes.
amster
attribute:scopeDelimiter
- OAuth Scopes
-
List of user profile properties
According to the OAuth 2.0 Authorization Framework that the client application requires. The list depends on the permissions that the resource owner grants to the client application. Some authorization servers use non-standard separators for scopes.
For example, you might set this property to: openid, profile, email
amster
attribute:scopes
- Client Authentication Method
-
Field used to define how the client would be identified by the social provider.
amster
attribute:clientAuthenticationMethod
- PKCE Method
-
The PKCE transformation method to use when making requests to the authorization endpoint.
amster
attribute:pkceMethod
- Request Parameter JWT Option
-
Choose how Request Parameter JWTs will be sent to the OIDC Provider. Choose REFERENCE for OpenID Connect Request Parameter JWTs to be passed by reference. Choose VALUE for OpenID Connect Request Parameter JWTs to be passed as single, self-contained parameters.Choose NONE to specify that Request Parameter JWTs are not used.
amster
attribute:jwtRequestParameterOption
- Encrypt Request Parameter JWT
-
Enable the option to send an encrypted request parameter JWT.
amster
attribute:encryptJwtRequestParameter
- ACR Values
-
Space-separated string that specifies the acr values that the Authorization Server is being requested to use for processing this Authentication Request, with the values appearing in order of preference.
amster
attribute:acrValues
- Well Known Endpoint
-
The endpoint for retrieving a list of OAuth/OIDC endpoints.
For example, you might set this property to: https://accounts.google.com/.well-known/openid-configuration
amster
attribute:wellKnownEndpoint
- Request Object Audience
-
The intended audience of the request object. If unspecified, the issuer value will be used.
amster
attribute:requestObjectAudience
- OP Encrypts ID Tokens
-
Whether the OP encrypts ID Tokens. Will determine which resolver to use.
amster
attribute:encryptedIdTokens
- Issuer
-
The Issuer of OIDC ID Tokens.
For example, you might set this property to: https://accounts.google.com
amster
attribute:issuer
- Enable Native Nonce
-
When enabled, the Identity Provider Native SDK MUST include a nonce Claim in the ID Token with the Claim value being the nonce value sent in the Authentication Request.
amster
attribute:enableNativeNonce
- User Info Response Format
-
The expected format of UserInfo responses. Dictates how AM will process the response. The expected format must match the actual format.
amster
attribute:userInfoResponseType
- JWKS URI Endpoint
-
The JWKS URL endpoint for the RP to use when encrypting or validating
amster
attribute:jwksUriEndpoint
- JWT Signing Algorithm
-
The signing algorithm to use when signing the client assertion and request object jwt sent to social provider.
amster
attribute:jwtSigningAlgorithm
- JWT Encryption Algorithm
-
The encryption algorithm to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionAlgorithm
- JWT Encryption Method
-
The encryption method to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionMethod
- Private Key JWT Expiration Time (seconds)
-
The expiration time on or after which the private key JWT must not be accepted for processing.
amster
attribute:privateKeyJwtExpTime
- Response Mode
-
Informs the Authorization Server of the mechanism to use for returning Authorization Response parameters.
amster
attribute:responseMode
- UI Config Properties
-
Mapping of display properties to be defined and consumed by the UI.
amster
attribute:uiConfig
- Transform Script
-
A script that takes the raw profile object as input and outputs the normalized profile object.
amster
attribute:transform
oauth2Config
- Enabled
-
amster
attribute:enabled
- Auth ID Key
-
Field used to identify a user by the social provider.
For example, you might set this property to: sub
amster
attribute:authenticationIdKey
- Client ID
-
OAuth client_id parameter.
For more information on the OAuth client_id parameter, refer to RFC 6749, section 2.2.
amster
attribute:clientId
- Client Secret
-
OAuth client_secret parameter.
For more information on the OAuth client_secret parameter, refer to RFC 6749, section 2.3.1.
amster
attribute:clientSecret
- Authentication Endpoint URL
-
OAuth authentication endpoint URL.
This is the URL endpoint for OAuth authentication provided by the OAuth Identity Provider.
amster
attribute:authorizationEndpoint
- Access Token Endpoint URL
-
OAuth access token endpoint URL.
This is the URL endpoint for access token retrieval provided by the OAuth Identity Provider. Refer to RFC 6749, section 3.2.
amster
attribute:tokenEndpoint
- User Profile Service URL
-
User profile information URL.
This URL endpoint provides user profile information and is provided by the OAuth Identity Provider. Note that this URL should return JSON objects in response.
amster
attribute:userInfoEndpoint
- Token Introspection Endpoint URL
-
OAuth Token Introspection endpoint URL.
This is the URL endpoint for access token validation using the OAuth Identity Provider. Refer to RFC 7662.
amster
attribute:introspectEndpoint
- Redirect URL
-
amster
attribute:redirectURI
- Redirect after form post URL
-
Specify URL to redirect the form post parameters to.
amster
attribute:redirectAfterFormPostURI
- Scope Delimiter
-
The delimiter used by an auth server to separate scopes.
amster
attribute:scopeDelimiter
- OAuth Scopes
-
List of user profile properties
According to the OAuth 2.0 Authorization Framework that the client application requires. The list depends on the permissions that the resource owner grants to the client application. Some authorization servers use non-standard separators for scopes.
amster
attribute:scopes
- Client Authentication Method
-
Field used to define how the client would be identified by the social provider.
amster
attribute:clientAuthenticationMethod
- PKCE Method
-
The PKCE transformation method to use when making requests to the authorization endpoint.
amster
attribute:pkceMethod
- JWKS URI Endpoint
-
The JWKS URL endpoint for the RP to use when encrypting or validating
amster
attribute:jwksUriEndpoint
- JWT Signing Algorithm
-
The signing algorithm to use when signing the client assertion and request object jwt sent to social provider.
amster
attribute:jwtSigningAlgorithm
- JWT Encryption Algorithm
-
The encryption algorithm to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionAlgorithm
- JWT Encryption Method
-
The encryption method to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionMethod
- Private Key JWT Expiration Time (seconds)
-
The expiration time on or after which the private key JWT must not be accepted for processing.
amster
attribute:privateKeyJwtExpTime
- Response Mode
-
Informs the Authorization Server of the mechanism to use for returning Authorization Response parameters.
amster
attribute:responseMode
- UI Config Properties
-
Mapping of display properties to be defined and consumed by the UI.
amster
attribute:uiConfig
- Transform Script
-
A script that takes the raw profile object as input and outputs the normalized profile object.
amster
attribute:transform
appleConfig
- Enabled
-
amster
attribute:enabled
- Auth ID Key
-
Field used to identify a user by the social provider.
For example, you might set this property to: sub
amster
attribute:authenticationIdKey
- Client ID
-
OAuth client_id parameter.
For more information on the OAuth client_id parameter, refer to RFC 6749, section 2.2.
amster
attribute:clientId
- Client Secret
-
OAuth client_secret parameter.
For more information on the OAuth client_secret parameter, refer to RFC 6749, section 2.3.1.
amster
attribute:clientSecret
- Authentication Endpoint URL
-
OAuth authentication endpoint URL
This is the URL endpoint for OAuth authentication provided by the OAuth Identity Provider.
For example, you might set this property to: https://appleid.apple.com/auth/authorize
amster
attribute:authorizationEndpoint
- Access Token Endpoint URL
-
OAuth access token endpoint URL.
This is the URL endpoint for access token retrieval provided by the OAuth Identity Provider. Refer to RFC 6749, section 3.2.
For example, you might set this property to: https://appleid.apple.com/auth/token
amster
attribute:tokenEndpoint
- User Profile Service URL
-
User profile information URL
This URL endpoint provides user profile information and is provided by the OAuth Identity Provider. Note that this URL should return JSON objects in response.
amster
attribute:userInfoEndpoint
- Token Introspection Endpoint URL
-
OAuth Token Introspection endpoint URL.
This is the URL endpoint for access token validation using the OAuth Identity Provider. Refer to RFC 7662.
amster
attribute:introspectEndpoint
- Redirect URL
-
amster
attribute:redirectURI
- Redirect after form post URL
-
Specify URL to redirect the form post parameters to.
amster
attribute:redirectAfterFormPostURI
- Scope Delimiter
-
The delimiter used by an auth server to separate scopes.
amster
attribute:scopeDelimiter
- OAuth Scopes
-
List of user profile properties
According to the OAuth 2.0 Authorization Framework that the client application requires. The list depends on the permissions that the resource owner grants to the client application. Some authorization servers use non-standard separators for scopes.
amster
attribute:scopes
- Client Authentication Method
-
Field used to define how the client would be identified by the social provider.
amster
attribute:clientAuthenticationMethod
- PKCE Method
-
The PKCE transformation method to use when making requests to the authorization endpoint.
amster
attribute:pkceMethod
- Request Parameter JWT Option
-
Choose how Request Parameter JWTs will be sent to the OIDC Provider. Choose REFERENCE for OpenID Connect Request Parameter JWTs to be passed by reference. Choose VALUE for OpenID Connect Request Parameter JWTs to be passed as single, self-contained parameters.Choose NONE to specify that Request Parameter JWTs are not used.
amster
attribute:jwtRequestParameterOption
- Encrypt Request Parameter JWT
-
Enable the option to send an encrypted request parameter JWT.
amster
attribute:encryptJwtRequestParameter
- ACR Values
-
Space-separated string that specifies the acr values that the Authorization Server is being requested to use for processing this Authentication Request, with the values appearing in order of preference.
amster
attribute:acrValues
- Well Known Endpoint
-
The endpoint for retrieving a list of OAuth/OIDC endpoints.
amster
attribute:wellKnownEndpoint
- Request Object Audience
-
The intended audience of the request object. If unspecified, the issuer value will be used.
amster
attribute:requestObjectAudience
- OP Encrypts ID Tokens
-
Whether the OP encrypts ID Tokens. Will determine which resolver to use.
amster
attribute:encryptedIdTokens
- Issuer
-
The Issuer of OIDC ID Tokens.
amster
attribute:issuer
- Enable Native Nonce
-
When enabled, the Identity Provider Native SDK MUST include a nonce Claim in the ID Token with the Claim value being the nonce value sent in the Authentication Request.
amster
attribute:enableNativeNonce
- User Info Response Format
-
The expected format of UserInfo responses. Dictates how AM will process the response. The expected format must match the actual format.
amster
attribute:userInfoResponseType
- JWKS URI Endpoint
-
The JWKS URL endpoint for the RP to use when encrypting or validating
amster
attribute:jwksUriEndpoint
- JWT Signing Algorithm
-
The signing algorithm to use when signing the client assertion and request object jwt sent to social provider.
amster
attribute:jwtSigningAlgorithm
- JWT Encryption Algorithm
-
The encryption algorithm to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionAlgorithm
- JWT Encryption Method
-
The encryption method to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionMethod
- Private Key JWT Expiration Time (seconds)
-
The expiration time on or after which the private key JWT must not be accepted for processing.
amster
attribute:privateKeyJwtExpTime
- Response Mode
-
Informs the Authorization Server of the mechanism to use for returning Authorization Response parameters.
amster
attribute:responseMode
- UI Config Properties
-
Mapping of display properties to be defined and consumed by the UI.
amster
attribute:uiConfig
- Transform Script
-
A script that takes the raw profile object as input and outputs the normalized profile object.
amster
attribute:transform
itsmeConfig
- Enabled
-
amster
attribute:enabled
- Auth ID Key
-
Field used to identify a user by the social provider.
For example, you might set this property to: sub
amster
attribute:authenticationIdKey
- Client ID
-
OAuth client_id parameter.
For more information on the OAuth client_id parameter, refer to RFC 6749, section 2.2.
amster
attribute:clientId
- Client Secret
-
OAuth client_secret parameter.
For more information on the OAuth client_secret parameter, refer to RFC 6749, section 2.3.1.
amster
attribute:clientSecret
- Authentication Endpoint URL
-
OAuth authentication endpoint URL
This is the URL endpoint for OAuth authentication provided by the OAuth Identity Provider.
For example, you might set this property to: https://idp.prd.itsme.services/v2/authorization
amster
attribute:authorizationEndpoint
- Access Token Endpoint URL
-
OAuth access token endpoint URL.
This is the URL endpoint for access token retrieval provided by the OAuth Identity Provider. Refer to RFC 6749, section 3.2.
For example, you might set this property to: https://idp.prd.itsme.services/v2/token
amster
attribute:tokenEndpoint
- User Profile Service URL
-
User profile information URL
This URL endpoint provides user profile information and is provided by the OAuth Identity Provider. Note that this URL should return JSON objects in response.
For example, you might set this property to: https://idp.prd.itsme.services/v2/userinfo
amster
attribute:userInfoEndpoint
- Token Introspection Endpoint URL
-
OAuth Token Introspection endpoint URL.
This is the URL endpoint for access token validation using the OAuth Identity Provider. Refer to RFC 7662.
amster
attribute:introspectEndpoint
- Redirect URL
-
amster
attribute:redirectURI
- Redirect after form post URL
-
Specify URL to redirect the form post parameters to.
amster
attribute:redirectAfterFormPostURI
- Scope Delimiter
-
The delimiter used by an auth server to separate scopes.
amster
attribute:scopeDelimiter
- OAuth Scopes
-
List of user profile properties
According to the OAuth 2.0 Authorization Framework that the client application requires. The list depends on the permissions that the resource owner grants to the client application. Some authorization servers use non-standard separators for scopes.
For example, you might set this property to: openid, profile, email
amster
attribute:scopes
- Client Authentication Method
-
Field used to define how the client would be identified by the social provider.
amster
attribute:clientAuthenticationMethod
- PKCE Method
-
The PKCE transformation method to use when making requests to the authorization endpoint.
Default value:
S256
amster
attribute:pkceMethod
- Request Parameter JWT Option
-
Choose how Request Parameter JWTs will be sent to the OIDC Provider. Choose REFERENCE for OpenID Connect Request Parameter JWTs to be passed by reference. Choose VALUE for OpenID Connect Request Parameter JWTs to be passed as single, self-contained parameters.Choose NONE to specify that Request Parameter JWTs are not used.
Default value:
NONE
amster
attribute:jwtRequestParameterOption
- Encrypt Request Parameter JWT
-
Enable the option to send an encrypted request parameter JWT.
Default value:
true
amster
attribute:encryptJwtRequestParameter
- ACR Values
-
Space-separated string that specifies the acr values that the Authorization Server is being requested to use for processing this Authentication Request, with the values appearing in order of preference.
amster
attribute:acrValues
- Well Known Endpoint
-
The endpoint for retrieving a list of OAuth/OIDC endpoints.
For example, you might set this property to: https://idp.prd.itsme.services/v2/.well-known/openid-configuration
amster
attribute:wellKnownEndpoint
- Request Object Audience
-
The intended audience of the request object. If unspecified, the issuer value will be used.
For example, you might set this property to: https://idp.prd.itsme.services/v2/authorization
Default value:
https://idp.prd.itsme.services/v2/authorization
amster
attribute:requestObjectAudience
- OP Encrypts ID Tokens
-
Whether the OP encrypts ID Tokens. Will determine which resolver to use.
Default value:
true
amster
attribute:encryptedIdTokens
- Issuer
-
The Issuer of OIDC ID Tokens.
For example, you might set this property to: https://idp.prd.itsme.services/v2
Default value:
https://idp.prd.itsme.services/v2
amster
attribute:issuer
- Enable Native Nonce
-
When enabled, the Identity Provider Native SDK MUST include a nonce Claim in the ID Token with the Claim value being the nonce value sent in the Authentication Request. Enabled by default.
Default value:
true
amster
attribute:enableNativeNonce
- User Info Response Format
-
The expected format of UserInfo responses. Dictates how AM will process the response. The expected format must match the actual format.
Default value:
SIGNED_THEN_ENCRYPTED_JWT
amster
attribute:userInfoResponseType
- JWKS URI Endpoint
-
The JWKS URL endpoint for the RP to use when encrypting or validating
For example, you might set this property to: https://idp.prd.itsme.services/v2/jwkSet
Default value:
https://idp.prd.itsme.services/v2/jwkSet
amster
attribute:jwksUriEndpoint
- JWT Signing Algorithm
-
The signing algorithm to use when signing the client assertion and request object jwt sent to social provider.
Default value:
RS256
amster
attribute:jwtSigningAlgorithm
- JWT Encryption Algorithm
-
The encryption algorithm to use when encrypting the client assertion and request object jwt sent to social provider.
Default value:
RSA-OAEP
amster
attribute:jwtEncryptionAlgorithm
- JWT Encryption Method
-
The encryption method to use when encrypting the client assertion and request object jwt sent to social provider.
Default value:
AES_128_CBC_HMAC_SHA_256
amster
attribute:jwtEncryptionMethod
- Private Key JWT Expiration Time (seconds)
-
The expiration time on or after which the private key JWT must not be accepted for processing.
Default value:
600
amster
attribute:privateKeyJwtExpTime
- Response Mode
-
Informs the Authorization Server of the mechanism to use for returning Authorization Response parameters.
Default value:
DEFAULT
amster
attribute:responseMode
- UI Config Properties
-
Mapping of display properties to be defined and consumed by the UI.
amster
attribute:uiConfig
- Transform Script
-
A script that takes the raw profile object as input and outputs the normalized profile object.
Default value:
3d97c436-42c0-4dd0-a571-ea6f34f752b3
amster
attribute:transform
amazonConfig
- Enabled
-
Default value:
true
amster
attribute:enabled
- Auth ID Key
-
Field used to identify a user by the social provider.
For example, you might set this property to: user_id
Default value:
user_id
amster
attribute:authenticationIdKey
- Client ID
-
OAuth client_id parameter.
For more information on the OAuth client_id parameter, refer to RFC 6749, section 2.2.
amster
attribute:clientId
- Client Secret
-
OAuth client_secret parameter.
For more information on the OAuth client_secret parameter, refer to RFC 6749, section 2.3.1.
amster
attribute:clientSecret
- Authentication Endpoint URL
-
OAuth authentication endpoint URL
This is the URL endpoint for OAuth authentication provided by the OAuth Identity Provider.
For example, you might set this property to: https://www.amazon.com/ap/oa
Default value:
https://www.amazon.com/ap/oa
amster
attribute:authorizationEndpoint
- Access Token Endpoint URL
-
OAuth access token endpoint URL.
This is the URL endpoint for access token retrieval provided by the OAuth Identity Provider. Refer to RFC 6749, section 3.2.
For example, you might set this property to: https://api.amazon.com/auth/o2/token
Default value:
https://api.amazon.com/auth/o2/token
amster
attribute:tokenEndpoint
- User Profile Service URL
-
User profile information URL
This URL endpoint provides user profile information and is provided by the OAuth Identity Provider. Note that this URL should return JSON objects in response.
For example, you might set this property to: https://api.amazon.com/user/profile
Default value:
https://api.amazon.com/user/profile
amster
attribute:userInfoEndpoint
- Token Introspection Endpoint URL
-
OAuth Token Introspection endpoint URL.
This is the URL endpoint for access token validation using the OAuth Identity Provider. Refer to RFC 7662.
amster
attribute:introspectEndpoint
- Redirect URL
-
amster
attribute:redirectURI
- Redirect after form post URL
-
Specify URL to redirect the form post parameters to.
amster
attribute:redirectAfterFormPostURI
- Scope Delimiter
-
The delimiter used by an auth server to separate scopes.
amster
attribute:scopeDelimiter
- OAuth Scopes
-
List of user profile properties.
According to the OAuth 2.0 Authorization Framework that the client application requires. The list depends on the permissions that the resource owner grants to the client application. Some authorization servers use non-standard separators for scopes.
For example, you might set this property to: profile
Default value:
profile
amster
attribute:scopes
- Client Authentication Method
-
Field used to define how the client would be identified by the social provider.
Default value:
CLIENT_SECRET_POST
amster
attribute:clientAuthenticationMethod
- PKCE Method
-
The PKCE transformation method to use when making requests to the authorization endpoint.
Default value:
S256
amster
attribute:pkceMethod
- JWKS URI Endpoint
-
The JWKS URL endpoint for the RP to use when encrypting or validating.
amster
attribute:jwksUriEndpoint
- JWT Signing Algorithm
-
The signing algorithm to use when signing the client assertion and request object jwt sent to social provider.
amster
attribute:jwtSigningAlgorithm
- JWT Encryption Algorithm
-
The encryption algorithm to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionAlgorithm
- JWT Encryption Method
-
The encryption method to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionMethod
- Private Key JWT Expiration Time (seconds)
-
The expiration time on or after which the private key JWT must not be accepted for processing.
Default value:
600
amster
attribute:privateKeyJwtExpTime
- Response Mode
-
Informs the Authorization Server of the mechanism to use for returning Authorization Response parameters.
Default value:
DEFAULT
amster
attribute:responseMode
- UI Config Properties
-
Mapping of display properties to be defined and consumed by the UI.
amster
attribute:uiConfig
- Transform Script
-
A script that takes the raw profile object as input and outputs the normalized profile object.
Default value:
6b3cfd48-62d3-48ff-a96f-fe8f3a22ab30
amster
attribute:transform
facebookConfig
- Enabled
-
Default value:
true
amster
attribute:enabled
- Auth ID Key
-
Field used to identify a user by the social provider.
For example, you might set this property to: id
Default value:
id
amster
attribute:authenticationIdKey
- Client ID
-
OAuth client_id parameter.
For more information on the OAuth client_id parameter, refer to RFC 6749, section 2.2.
amster
attribute:clientId
- Client Secret
-
OAuth client_secret parameter.
For more information on the OAuth client_secret parameter, refer to RFC 6749, section 2.3.1.
amster
attribute:clientSecret
- Authentication Endpoint URL
-
OAuth authentication endpoint URL.
This is the URL endpoint for OAuth authentication provided by the OAuth Identity Provider.
For example, you might set this property to: https://www.facebook.com/dialog/oauth
Default value:
https://www.facebook.com/dialog/oauth
amster
attribute:authorizationEndpoint
- Access Token Endpoint URL
-
OAuth access token endpoint URL.
This is the URL endpoint for access token retrieval provided by the OAuth Identity Provider. Refer to RFC 6749, section 3.2.
For example, you might set this property to: https://graph.facebook.com/v2.7/oauth/access_token
Default value:
https://graph.facebook.com/v2.7/oauth/access_token
amster
attribute:tokenEndpoint
- User Profile Service URL
-
User profile information URL
This URL endpoint provides user profile information and is provided by the OAuth Identity Provider. Note that this URL should return JSON objects in response.
For example, you might set this property to: https://graph.facebook.com/me?fields=id,name,picture,email,first_name,last_name,locale
Default value:
https://graph.facebook.com/me?fields=id,name,picture,email,first_name,last_name,locale
amster
attribute:userInfoEndpoint
- Token Introspection Endpoint URL
-
OAuth Token Introspection endpoint URL.
This is the URL endpoint for access token validation using the OAuth Identity Provider. Refer to RFC 7662.
For example, you might set this property to: https://graph.facebook.com/debug_token
Default value:
https://graph.facebook.com/debug_token
amster
attribute:introspectEndpoint
- Redirect URL
-
amster
attribute:redirectURI
- Redirect after form post URL
-
Specify URL to redirect the form post parameters to.
amster
attribute:redirectAfterFormPostURI
- Scope Delimiter
-
The delimiter used by an auth server to separate scopes.
amster
attribute:scopeDelimiter
- OAuth Scopes
-
List of user profile properties
According to the OAuth 2.0 Authorization Framework that the client application requires. The list depends on the permissions that the resource owner grants to the client application. Some authorization servers use non-standard separators for scopes.
For example, you might set this property to: email, user_birthday
Default value:
email user_birthday
amster
attribute:scopes
- Client Authentication Method
-
Field used to define how the client would be identified by the social provider.
Default value:
CLIENT_SECRET_POST
amster
attribute:clientAuthenticationMethod
- PKCE Method
-
The PKCE transformation method to use when making requests to the authorization endpoint.
Default value:
S256
amster
attribute:pkceMethod
- JWKS URI Endpoint
-
The JWKS URL endpoint for the RP to use when encrypting or validating
amster
attribute:jwksUriEndpoint
- JWT Signing Algorithm
-
The signing algorithm to use when signing the client assertion and request object jwt sent to social provider.
amster
attribute:jwtSigningAlgorithm
- JWT Encryption Algorithm
-
The encryption algorithm to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionAlgorithm
- JWT Encryption Method
-
The encryption method to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionMethod
- Private Key JWT Expiration Time (seconds)
-
The expiration time on or after which the private key JWT must not be accepted for processing.
Default value:
600
amster
attribute:privateKeyJwtExpTime
- Response Mode
-
Informs the Authorization Server of the mechanism to use for returning Authorization Response parameters.
Default value:
DEFAULT
amster
attribute:responseMode
- UI Config Properties
-
Mapping of display properties to be defined and consumed by the UI.
amster
attribute:uiConfig
- Transform Script
-
A script that takes the raw profile object as input and outputs the normalized profile object.
Default value:
bae1d54a-e97d-4997-aa5d-c027f21af82c
amster
attribute:transform
weChatConfig
- Enabled
-
Default value:
true
amster
attribute:enabled
- Auth ID Key
-
Field used to identify a user by the social provider.
For example, you might set this property to: openid
Default value:
openid
amster
attribute:authenticationIdKey
- Client ID
-
OAuth client_id parameter.
For more information on the OAuth client_id parameter, refer to RFC 6749, section 2.2.
amster
attribute:clientId
- Client Secret
-
OAuth client_secret parameter.
For more information on the OAuth client_secret parameter, refer to RFC 6749, section 2.3.1.
amster
attribute:clientSecret
- Authentication Endpoint URL
-
OAuth authentication endpoint URL
This is the URL endpoint for OAuth authentication provided by the OAuth Identity Provider.
For example, you might set this property to: https://open.weixin.qq.com/connect/qrconnect
Default value:
https://open.weixin.qq.com/connect/qrconnect
amster
attribute:authorizationEndpoint
- Access Token Endpoint URL
-
OAuth access token endpoint URL.
This is the URL endpoint for access token retrieval provided by the OAuth Identity Provider. Refer to RFC 6749, section 3.2.
For example, you might set this property to: https://api.wechat.com/sns/oauth2/access_token
Default value:
https://api.wechat.com/sns/oauth2/access_token
amster
attribute:tokenEndpoint
- User Profile Service URL
-
User profile information URL
This URL endpoint provides user profile information and is provided by the OAuth Identity Provider. Note that this URL should return JSON objects in response.
For example, you might set this property to: https://api.wechat.com/sns/userinfo
Default value:
https://api.wechat.com/sns/userinfo
amster
attribute:userInfoEndpoint
- Token Introspection Endpoint URL
-
OAuth Token Introspection endpoint URL.
This is the URL endpoint for access token validation using the OAuth Identity Provider. Refer to RFC 7662.
amster
attribute:introspectEndpoint
- Redirect URL
-
amster
attribute:redirectURI
- Redirect after form post URL
-
Specify URL to redirect the form post parameters to.
amster
attribute:redirectAfterFormPostURI
- Scope Delimiter
-
The delimiter used by an auth server to separate scopes.
amster
attribute:scopeDelimiter
- OAuth Scopes
-
List of user profile properties
According to the OAuth 2.0 Authorization Framework that the client application requires. The list depends on the permissions that the resource owner grants to the client application. Some authorization servers use non-standard separators for scopes.
For example, you might set this property to: snsapi_login
Default value:
snsapi_login
amster
attribute:scopes
- Client Authentication Method
-
Field used to define how the client would be identified by the social provider.
Default value:
CLIENT_SECRET_POST
amster
attribute:clientAuthenticationMethod
- PKCE Method
-
The PKCE transformation method to use when making requests to the authorization endpoint.
Default value:
S256
amster
attribute:pkceMethod
- Refresh Token Endpoint
-
The endpoint for obtaining a refresh token.
Default value:
https://api.wechat.com/sns/oauth2/refresh_token
amster
attribute:refreshTokenEndpoint
- JWKS URI Endpoint
-
The JWKS URL endpoint for the RP to use when encrypting or validating
amster
attribute:jwksUriEndpoint
- JWT Signing Algorithm
-
The signing algorithm to use when signing the client assertion and request object jwt sent to social provider.
amster
attribute:jwtSigningAlgorithm
- JWT Encryption Algorithm
-
The encryption algorithm to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionAlgorithm
- JWT Encryption Method
-
The encryption method to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionMethod
- Private Key JWT Expiration Time (seconds)
-
The expiration time on or after which the private key JWT must not be accepted for processing.
Default value:
600
amster
attribute:privateKeyJwtExpTime
- Response Mode
-
Informs the Authorization Server of the mechanism to use for returning Authorization Response parameters.
Default value:
DEFAULT
amster
attribute:responseMode
- UI Config Properties
-
Mapping of display properties to be defined and consumed by the UI.
amster
attribute:uiConfig
- Transform Script
-
A script that takes the raw profile object as input and outputs the normalized profile object.
Default value:
472534ec-a25f-468d-a606-3fb1935190df
amster
attribute:transform
yahooConfig
- Enabled
-
Default value:
true
amster
attribute:enabled
- Auth ID Key
-
Field used to identify a user by the social provider.
For example, you might set this property to: sub
Default value:
sub
amster
attribute:authenticationIdKey
- Client ID
-
OAuth client_id parameter.
For more information on the OAuth client_id parameter, refer to RFC 6749, section 2.2.
amster
attribute:clientId
- Client Secret
-
OAuth client_secret parameter.
For more information on the OAuth client_secret parameter, refer to RFC 6749, section 2.3.1.
amster
attribute:clientSecret
- Authentication Endpoint URL
-
OAuth authentication endpoint URL
This is the URL endpoint for OAuth authentication provided by the OAuth Identity Provider.
For example, you might set this property to: https://api.login.yahoo.com/oauth2/request_auth
Default value:
https://api.login.yahoo.com/oauth2/request_auth
amster
attribute:authorizationEndpoint
- Access Token Endpoint URL
-
OAuth access token endpoint URL.
This is the URL endpoint for access token retrieval provided by the OAuth Identity Provider. Refer to RFC 6749, section 3.2.
For example, you might set this property to: https://api.login.yahoo.com/oauth2/get_token
Default value:
https://api.login.yahoo.com/oauth2/get_token
amster
attribute:tokenEndpoint
- User Profile Service URL
-
User profile information URL
This URL endpoint provides user profile information and is provided by the OAuth Identity Provider. Note that this URL should return JSON objects in response.
amster
attribute:userInfoEndpoint
- Token Introspection Endpoint URL
-
OAuth Token Introspection endpoint URL This is the URL endpoint for access token validation using the OAuth Identity Provider.Refer to the RFC 7662 (https://www.rfc-editor.org/info/rfc7662).
amster
attribute:introspectEndpoint
- Redirect URL
-
amster
attribute:redirectURI
- Redirect after form post URL
-
Specify URL to redirect the form post parameters to.
amster
attribute:redirectAfterFormPostURI
- Scope Delimiter
-
The delimiter used by an auth server to separate scopes.
amster
attribute:scopeDelimiter
- OAuth Scopes
-
List of user profile properties
According to the OAuth 2.0 Authorization Framework that the client application requires. The list depends on the permissions that the resource owner grants to the client application. Some authorization servers use non-standard separators for scopes.
For example, you might set this property to: openid, sdpp-w
Default value:
openid sdpp-w
amster
attribute:scopes
- Client Authentication Method
-
Field used to define how the client would be identified by the social provider.
Default value:
CLIENT_SECRET_POST
amster
attribute:clientAuthenticationMethod
- PKCE Method
-
The PKCE transformation method to use when making requests to the authorization endpoint.
Default value:
S256
amster
attribute:pkceMethod
- Request Parameter JWT Option
-
Choose how Request Parameter JWTs will be sent to the OIDC Provider. Choose REFERENCE for OpenID Connect Request Parameter JWTs to be passed by reference. Choose VALUE for OpenID Connect Request Parameter JWTs to be passed as single, self-contained parameters.Choose NONE to specify that Request Parameter JWTs are not used.
Default value:
NONE
amster
attribute:jwtRequestParameterOption
- Encrypt Request Parameter JWT
-
Enable the option to send an encrypted request parameter JWT.
Default value:
false
amster
attribute:encryptJwtRequestParameter
- ACR Values
-
Space-separated string that specifies the acr values that the Authorization Server is being requested to use for processing this Authentication Request, with the values appearing in order of preference.
amster
attribute:acrValues
- Well Known Endpoint
-
The endpoint for retrieving a list of OAuth/OIDC endpoints.
For example, you might set this property to: https://api.login.yahoo.com/.well-known/openid-configuration
Default value:
https://api.login.yahoo.com/.well-known/openid-configuration
amster
attribute:wellKnownEndpoint
- Request Object Audience
-
The intended audience of the request object. If unspecified, the issuer value will be used.
amster
attribute:requestObjectAudience
- OP Encrypts ID Tokens
-
Whether the OP encrypts ID Tokens. Will determine which resolver to use.
Default value:
false
amster
attribute:encryptedIdTokens
- Issuer
-
The Issuer of OIDC ID Tokens.
For example, you might set this property to: https://api.login.yahoo.com
Default value:
https://api.login.yahoo.com
amster
attribute:issuer
- Enable Native Nonce
-
When enabled, the Identity Provider Native SDK MUST include a nonce Claim in the ID Token with the Claim value being the nonce value sent in the Authentication Request. Enabled by default.
Default value:
true
amster
attribute:enableNativeNonce
- User Info Response Format
-
The expected format of UserInfo responses. Dictates how AM will process the response. The expected format must match the actual format.
Default value:
JSON
amster
attribute:userInfoResponseType
- JWKS URI Endpoint
-
The JWKS URL endpoint for the RP to use when encrypting or validating
amster
attribute:jwksUriEndpoint
- JWT Signing Algorithm
-
The signing algorithm to use when signing the client assertion and request object jwt sent to social provider.
amster
attribute:jwtSigningAlgorithm
- JWT Encryption Algorithm
-
The encryption algorithm to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionAlgorithm
- JWT Encryption Method
-
The encryption method to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionMethod
- Private Key JWT Expiration Time (seconds)
-
The expiration time on or after which the private key JWT must not be accepted for processing.
Default value:
600
amster
attribute:privateKeyJwtExpTime
- Response Mode
-
Informs the Authorization Server of the mechanism to use for returning Authorization Response parameters.
Default value:
DEFAULT
amster
attribute:responseMode
- UI Config Properties
-
Mapping of display properties to be defined and consumed by the UI.
amster
attribute:uiConfig
- Transform Script
-
A script that takes the raw profile object as input and outputs the normalized profile object.
Default value:
424da748-82cc-4b54-be6f-82bd64d82a74
amster
attribute:transform
oidcConfig
- Enabled
-
Default value:
true
amster
attribute:enabled
- Auth ID Key
-
Field used to identify a user by the social provider.
For example, you might set this property to: sub
amster
attribute:authenticationIdKey
- Client ID
-
OAuth client_id parameter.
For more information on the OAuth client_id parameter, refer to RFC 6749, section 2.2.
amster
attribute:clientId
- Client Secret
-
OAuth client_secret parameter.
For more information on the OAuth client_secret parameter, refer to RFC 6749, section 2.3.1.
amster
attribute:clientSecret
- Authentication Endpoint URL
-
OAuth authentication endpoint URL
This is the URL endpoint for OAuth authentication provided by the OAuth Identity Provider.
amster
attribute:authorizationEndpoint
- Access Token Endpoint URL
-
OAuth access token endpoint URL.
This is the URL endpoint for access token retrieval provided by the OAuth Identity Provider. Refer to RFC 6749, section 3.2.
amster
attribute:tokenEndpoint
- User Profile Service URL
-
User profile information URL
This URL endpoint provides user profile information and is provided by the OAuth Identity Provider. Note that this URL should return JSON objects in response.
amster
attribute:userInfoEndpoint
- Token Introspection Endpoint URL
-
OAuth Token Introspection endpoint URL.
This is the URL endpoint for access token validation using the OAuth Identity Provider. Refer to RFC 7662.
amster
attribute:introspectEndpoint
- Redirect URL
-
amster
attribute:redirectURI
- Redirect after form post URL
-
Specify URL to redirect the form post parameters to.
amster
attribute:redirectAfterFormPostURI
- Scope Delimiter
-
The delimiter used by an auth server to separate scopes.
amster
attribute:scopeDelimiter
- OAuth Scopes
-
List of user profile properties
According to the OAuth 2.0 Authorization Framework that the client application requires. The list depends on the permissions that the resource owner grants to the client application. Some authorization servers use non-standard separators for scopes.
amster
attribute:scopes
- Client Authentication Method
-
Field used to define how the client would be identified by the social provider.
Default value:
CLIENT_SECRET_POST
amster
attribute:clientAuthenticationMethod
- PKCE Method
-
The PKCE transformation method to use when making requests to the authorization endpoint.
Default value:
S256
amster
attribute:pkceMethod
- Request Parameter JWT Option
-
Choose how Request Parameter JWTs will be sent to the OIDC Provider. Choose REFERENCE for OpenID Connect Request Parameter JWTs to be passed by reference. Choose VALUE for OpenID Connect Request Parameter JWTs to be passed as single, self-contained parameters.Choose NONE to specify that Request Parameter JWTs are not used.
Default value:
NONE
amster
attribute:jwtRequestParameterOption
- Encrypt Request Parameter JWT
-
Enable the option to send an encrypted request parameter JWT.
Default value:
false
amster
attribute:encryptJwtRequestParameter
- ACR Values
-
Space-separated string that specifies the acr values that the Authorization Server is being requested to use for processing this Authentication Request, with the values appearing in order of preference.
amster
attribute:acrValues
- Well Known Endpoint
-
The endpoint for retrieving a list of OAuth/OIDC endpoints.
amster
attribute:wellKnownEndpoint
- Request Object Audience
-
The intended audience of the request object. If unspecified, the issuer value will be used.
amster
attribute:requestObjectAudience
- OP Encrypts ID Tokens
-
Whether the OP encrypts ID Tokens. Will determine which resolver to use.
amster
attribute:encryptedIdTokens
- Issuer
-
The Issuer of OIDC ID Tokens.
amster
attribute:issuer
- Enable Native Nonce
-
When enabled, the Identity Provider Native SDK MUST include a nonce Claim in the ID Token with the Claim value being the nonce value sent in the Authentication Request. Enabled by default.
Default value:
true
amster
attribute:enableNativeNonce
- User Info Response Format
-
The expected format of UserInfo responses. Dictates how AM will process the response. The expected format must match the actual format.
Default value:
JSON
amster
attribute:userInfoResponseType
- JWKS URI Endpoint
-
The JWKS URL endpoint for the RP to use when encrypting or validating
amster
attribute:jwksUriEndpoint
- JWT Signing Algorithm
-
The signing algorithm to use when signing the client assertion and request object jwt sent to social provider.
amster
attribute:jwtSigningAlgorithm
- JWT Encryption Algorithm
-
The encryption algorithm to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionAlgorithm
- JWT Encryption Method
-
The encryption method to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionMethod
- Private Key JWT Expiration Time (seconds)
-
The expiration time on or after which the private key JWT must not be accepted for processing.
Default value:
600
amster
attribute:privateKeyJwtExpTime
- Response Mode
-
Informs the Authorization Server of the mechanism to use for returning Authorization Response parameters.
Default value:
DEFAULT
amster
attribute:responseMode
- UI Config Properties
-
Mapping of display properties to be defined and consumed by the UI.
amster
attribute:uiConfig
- Transform Script
-
A script that takes the raw profile object as input and outputs the normalized profile object.
amster
attribute:transform
linkedInConfig
- Enabled
-
Default value:
true
amster
attribute:enabled
- Auth ID Key
-
Field used to identify a user by the social provider.
For example, you might set this property to: id
Default value:
id
amster
attribute:authenticationIdKey
- Client ID
-
OAuth client_id parameter.
For more information on the OAuth client_id parameter, refer to RFC 6749, section 2.2.
amster
attribute:clientId
- Client Secret
-
OAuth client_secret parameter.
For more information on the OAuth client_secret parameter, refer to RFC 6749, section 2.3.1.
amster
attribute:clientSecret
- Authentication Endpoint URL
-
OAuth authentication endpoint URL
This is the URL endpoint for OAuth authentication provided by the OAuth Identity Provider.
For example, you might set this property to: https://www.linkedin.com/oauth/v2/authorization
Default value:
https://www.linkedin.com/oauth/v2/authorization
amster
attribute:authorizationEndpoint
- Access Token Endpoint URL
-
OAuth access token endpoint URL.
This is the URL endpoint for access token retrieval provided by the OAuth Identity Provider. Refer to RFC 6749, section 3.2.
For example, you might set this property to: https://www.linkedin.com/oauth/v2/accessToken
Default value:
https://www.linkedin.com/oauth/v2/accessToken
amster
attribute:tokenEndpoint
- User Profile Service URL
-
User profile information URL
This URL endpoint provides user profile information and is provided by the OAuth Identity Provider. Note that this URL should return JSON objects in response.
For example, you might set this property to: https://api.linkedin.com/v2/me?projection=(id,firstName,lastName,profilePicture)
amster
attribute:userInfoEndpoint
- Token Introspection Endpoint URL
-
OAuth Token Introspection endpoint URL.
This is the URL endpoint for access token validation using the OAuth Identity Provider. Refer to RFC 7662.
For example, you might set this property to: https://www.linkedin.com/oauth/v2/introspectToken
Default value:
https://www.linkedin.com/oauth/v2/introspectToken
amster
attribute:introspectEndpoint
- Redirect URL
-
amster
attribute:redirectURI
- Redirect after form post URL
-
Specify URL to redirect the form post parameters to.
amster
attribute:redirectAfterFormPostURI
- Scope Delimiter
-
The delimiter used by an auth server to separate scopes.
amster
attribute:scopeDelimiter
- OAuth Scopes
-
List of user profile properties
According to the OAuth 2.0 Authorization Framework that the client application requires. The list depends on the permissions that the resource owner grants to the client application. Some authorization servers use non-standard separators for scopes.
For example, you might set this property to: r_liteprofile, r_emailaddress
Default value:
r_liteprofile r_emailaddress
amster
attribute:scopes
- Client Authentication Method
-
Field used to define how the client would be identified by the social provider.
Default value:
CLIENT_SECRET_POST
amster
attribute:clientAuthenticationMethod
- PKCE Method
-
The PKCE transformation method to use when making requests to the authorization endpoint.
Default value:
S256
amster
attribute:pkceMethod
- Email Address Endpoint
-
The endpoint for retrieving the email address.
amster
attribute:emailAddressEndpoint
- JWKS URI Endpoint
-
The JWKS URL endpoint for the RP to use when encrypting or validating
amster
attribute:jwksUriEndpoint
- JWT Signing Algorithm
-
The signing algorithm to use when signing the client assertion and request object jwt sent to social provider.
amster
attribute:jwtSigningAlgorithm
- JWT Encryption Algorithm
-
The encryption algorithm to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionAlgorithm
- JWT Encryption Method
-
The encryption method to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionMethod
- Private Key JWT Expiration Time (seconds)
-
The expiration time on or after which the private key JWT must not be accepted for processing.
Default value:
600
amster
attribute:privateKeyJwtExpTime
- Response Mode
-
Informs the Authorization Server of the mechanism to use for returning Authorization Response parameters.
Default value:
DEFAULT
amster
attribute:responseMode
- UI Config Properties
-
Mapping of display properties to be defined and consumed by the UI.
amster
attribute:uiConfig
- Transform Script
-
A script that takes the raw profile object as input and outputs the normalized profile object.
Default value:
8862ca8f-7770-4af5-a888-ac0df0947f36
amster
attribute:transform
salesforceConfig
- Enabled
-
Default value:
true
amster
attribute:enabled
- Auth ID Key
-
Field used to identify a user by the social provider.
For example, you might set this property to: user_id
Default value:
user_id
amster
attribute:authenticationIdKey
- Client ID
-
OAuth client_id parameter.
For more information on the OAuth client_id parameter, refer to RFC 6749, section 2.2.
amster
attribute:clientId
- Client Secret
-
OAuth client_secret parameter.
For more information on the OAuth client_secret parameter, refer to RFC 6749, section 2.3.1.
amster
attribute:clientSecret
- Authentication Endpoint URL
-
OAuth authentication endpoint URL
This is the URL endpoint for OAuth authentication provided by the OAuth Identity Provider.
For example, you might set this property to: https://login.salesforce.com/services/oauth2/authorize
Default value:
https://login.salesforce.com/services/oauth2/authorize
amster
attribute:authorizationEndpoint
- Access Token Endpoint URL
-
OAuth access token endpoint URL.
This is the URL endpoint for access token retrieval provided by the OAuth Identity Provider. Refer to RFC 6749, section 3.2.
For example, you might set this property to: https://login.salesforce.com/services/oauth2/token
Default value:
https://login.salesforce.com/services/oauth2/token
amster
attribute:tokenEndpoint
- User Profile Service URL
-
User profile information URL
This URL endpoint provides user profile information and is provided by the OAuth Identity Provider. Note that this URL should return JSON objects in response.
For example, you might set this property to: https://login.salesforce.com/services/oauth2/userinfo
Default value:
https://login.salesforce.com/services/oauth2/userinfo
amster
attribute:userInfoEndpoint
- Token Introspection Endpoint URL
-
OAuth Token Introspection endpoint URL.
This is the URL endpoint for access token validation using the OAuth Identity Provider. Refer to RFC 7662.
For example, you might set this property to: https://login.salesforce.com/services/oauth2/introspect
Default value:
https://login.salesforce.com/services/oauth2/introspect
amster
attribute:introspectEndpoint
- Redirect URL
-
amster
attribute:redirectURI
- Redirect after form post URL
-
Specify URL to redirect the form post parameters to.
amster
attribute:redirectAfterFormPostURI
- Scope Delimiter
-
The delimiter used by an auth server to separate scopes.
amster
attribute:scopeDelimiter
- OAuth Scopes
-
List of user profile properties
According to the OAuth 2.0 Authorization Framework that the client application requires. The list depends on the permissions that the resource owner grants to the client application. Some authorization servers use non-standard separators for scopes.
For example, you might set this property to: id, api, web
Default value:
id api web
amster
attribute:scopes
- Client Authentication Method
-
Field used to define how the client would be identified by the social provider.
Default value:
CLIENT_SECRET_POST
amster
attribute:clientAuthenticationMethod
- PKCE Method
-
The PKCE transformation method to use when making requests to the authorization endpoint.
Default value:
S256
amster
attribute:pkceMethod
- JWKS URI Endpoint
-
The JWKS URL endpoint for the RP to use when encrypting or validating
amster
attribute:jwksUriEndpoint
- JWT Signing Algorithm
-
The signing algorithm to use when signing the client assertion and request object jwt sent to social provider.
amster
attribute:jwtSigningAlgorithm
- JWT Encryption Algorithm
-
The encryption algorithm to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionAlgorithm
- JWT Encryption Method
-
The encryption method to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionMethod
- Private Key JWT Expiration Time (seconds)
-
The expiration time on or after which the private key JWT must not be accepted for processing.
Default value:
600
amster
attribute:privateKeyJwtExpTime
- Response Mode
-
Informs the Authorization Server of the mechanism to use for returning Authorization Response parameters.
Default value:
DEFAULT
amster
attribute:responseMode
- UI Config Properties
-
Mapping of display properties to be defined and consumed by the UI.
amster
attribute:uiConfig
- Transform Script
-
A script that takes the raw profile object as input and outputs the normalized profile object.
Default value:
312e951f-70c5-49d2-a9ae-93aef909d5df
amster
attribute:transform
wordpressConfig
- Enabled
-
Default value:
true
amster
attribute:enabled
- Auth ID Key
-
Field used to identify a user by the social provider.
For example, you might set this property to: username
Default value:
username
amster
attribute:authenticationIdKey
- Client ID
-
OAuth client_id parameter.
For more information on the OAuth client_id parameter, refer to RFC 6749, section 2.2.
amster
attribute:clientId
- Client Secret
-
OAuth client_secret parameter.
For more information on the OAuth client_secret parameter, refer to RFC 6749, section 2.3.1.
amster
attribute:clientSecret
- Authentication Endpoint URL
-
OAuth authentication endpoint URL
This is the URL endpoint for OAuth authentication provided by the OAuth Identity Provider.
For example, you might set this property to: https://public-api.wordpress.com/oauth2/authorize
Default value:
https://public-api.wordpress.com/oauth2/authorize
amster
attribute:authorizationEndpoint
- Access Token Endpoint URL
-
OAuth access token endpoint URL.
This is the URL endpoint for access token retrieval provided by the OAuth Identity Provider. Refer to RFC 6749, section 3.2.
For example, you might set this property to: https://public-api.wordpress.com/oauth2/token
Default value:
https://public-api.wordpress.com/oauth2/token
amster
attribute:tokenEndpoint
- User Profile Service URL
-
User profile information URL
This URL endpoint provides user profile information and is provided by the OAuth Identity Provider. Note that this URL should return JSON objects in response.
For example, you might set this property to: https://public-api.wordpress.com/rest/v1.1/me/
Default value:
https://public-api.wordpress.com/rest/v1.1/me/
amster
attribute:userInfoEndpoint
- Token Introspection Endpoint URL
-
OAuth Token Introspection endpoint URL.
This is the URL endpoint for access token validation using the OAuth Identity Provider. Refer to RFC 7662.
amster
attribute:introspectEndpoint
- Redirect URL
-
amster
attribute:redirectURI
- Redirect after form post URL
-
Specify URL to redirect the form post parameters to.
amster
attribute:redirectAfterFormPostURI
- Scope Delimiter
-
The delimiter used by an auth server to separate scopes.
amster
attribute:scopeDelimiter
- OAuth Scopes
-
List of user profile properties
According to the OAuth 2.0 Authorization Framework that the client application requires. The list depends on the permissions that the resource owner grants to the client application. Some authorization servers use non-standard separators for scopes.
For example, you might set this property to: auth
Default value:
auth
amster
attribute:scopes
- Client Authentication Method
-
Field used to define how the client would be identified by the social provider.
Default value:
CLIENT_SECRET_POST
amster
attribute:clientAuthenticationMethod
- PKCE Method
-
The PKCE transformation method to use when making requests to the authorization endpoint.
Default value:
S256
amster
attribute:pkceMethod
- JWKS URI Endpoint
-
The JWKS URL endpoint for the RP to use when encrypting or validating
amster
attribute:jwksUriEndpoint
- JWT Signing Algorithm
-
The signing algorithm to use when signing the client assertion and request object jwt sent to social provider.
amster
attribute:jwtSigningAlgorithm
- JWT Encryption Algorithm
-
The encryption algorithm to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionAlgorithm
- JWT Encryption Method
-
The encryption method to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionMethod
- Private Key JWT Expiration Time (seconds)
-
The expiration time on or after which the private key JWT must not be accepted for processing.
Default value:
600
amster
attribute:privateKeyJwtExpTime
- Response Mode
-
Informs the Authorization Server of the mechanism to use for returning Authorization Response parameters.
Default value:
DEFAULT
amster
attribute:responseMode
- UI Config Properties
-
Mapping of display properties to be defined and consumed by the UI.
amster
attribute:uiConfig
- Transform Script
-
A script that takes the raw profile object as input and outputs the normalized profile object.
Default value:
91d197de-5916-4dca-83b5-9a4df26e7159
amster
attribute:transform
microsoftConfig
- Enabled
-
Default value:
true
amster
attribute:enabled
- Auth ID Key
-
Field used to identify a user by the social provider.
For example, you might set this property to: id
Default value:
id
amster
attribute:authenticationIdKey
- Client ID
-
OAuth client_id parameter.
For more information on the OAuth client_id parameter, refer to RFC 6749, section 2.2.
amster
attribute:clientId
- Client Secret
-
OAuth client_secret parameter.
For more information on the OAuth client_secret parameter, refer to RFC 6749, section 2.3.1.
amster
attribute:clientSecret
- Authentication Endpoint URL
-
OAuth authentication endpoint URL
This is the URL endpoint for OAuth authentication provided by the OAuth Identity Provider.
For example, you might set this property to: https://login.microsoftonline.com/common/oauth2/v2.0/authorize
amster
attribute:authorizationEndpoint
- Access Token Endpoint URL
-
OAuth access token endpoint URL.
This is the URL endpoint for access token retrieval provided by the OAuth Identity Provider. Refer to RFC 6749, section 3.2.
For example, you might set this property to: https://login.microsoftonline.com/common/oauth2/v2.0/token
Default value:
https://login.microsoftonline.com/common/oauth2/v2.0/token
amster
attribute:tokenEndpoint
- User Profile Service URL
-
User profile information URL
This URL endpoint provides user profile information and is provided by the OAuth Identity Provider. Note that this URL should return JSON objects in response.
For example, you might set this property to: https://graph.microsoft.com/v1.0/me
Default value:
https://graph.microsoft.com/v1.0/me
amster
attribute:userInfoEndpoint
- Token Introspection Endpoint URL
-
OAuth Token Introspection endpoint URL.
This is the URL endpoint for access token validation using the OAuth Identity Provider. Refer to RFC 7662.
amster
attribute:introspectEndpoint
- Redirect URL
-
amster
attribute:redirectURI
- Redirect after form post URL
-
Specify URL to redirect the form post parameters to.
amster
attribute:redirectAfterFormPostURI
- Scope Delimiter
-
The delimiter used by an auth server to separate scopes.
amster
attribute:scopeDelimiter
- OAuth Scopes
-
List of user profile properties
According to the OAuth 2.0 Authorization Framework that the client application requires. The list depends on the permissions that the resource owner grants to the client application. Some authorization servers use non-standard separators for scopes.
For example, you might set this property to: User.Read
Default value:
User.Read
amster
attribute:scopes
- Client Authentication Method
-
Field used to define how the client would be identified by the social provider.
Default value:
CLIENT_SECRET_POST
amster
attribute:clientAuthenticationMethod
- PKCE Method
-
The PKCE transformation method to use when making requests to the authorization endpoint.
Default value:
S256
amster
attribute:pkceMethod
- JWKS URI Endpoint
-
The JWKS URL endpoint for the RP to use when encrypting or validating
amster
attribute:jwksUriEndpoint
- JWT Signing Algorithm
-
The signing algorithm to use when signing the client assertion and request object jwt sent to social provider.
amster
attribute:jwtSigningAlgorithm
- JWT Encryption Algorithm
-
The encryption algorithm to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionAlgorithm
- JWT Encryption Method
-
The encryption method to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionMethod
- Private Key JWT Expiration Time (seconds)
-
The expiration time on or after which the private key JWT must not be accepted for processing.
Default value:
600
amster
attribute:privateKeyJwtExpTime
- Response Mode
-
Informs the Authorization Server of the mechanism to use for returning Authorization Response parameters.
Default value:
DEFAULT
amster
attribute:responseMode
- UI Config Properties
-
Mapping of display properties to be defined and consumed by the UI.
amster
attribute:uiConfig
- Transform Script
-
A script that takes the raw profile object as input and outputs the normalized profile object.
Default value:
73cecbfc-dad0-4395-be6a-6858ee3a80e5
amster
attribute:transform
vkConfig
- Enabled
-
Default value:
true
amster
attribute:enabled
- Auth ID Key
-
Field used to identify a user by the social provider.
For example, you might set this property to: sub
Default value:
id
amster
attribute:authenticationIdKey
- Client ID
-
OAuth client_id parameter.
For more information on the OAuth client_id parameter, refer to RFC 6749, section 2.2.
amster
attribute:clientId
- Client Secret
-
OAuth client_secret parameter.
For more information on the OAuth client_secret parameter, refer to RFC 6749, section 2.3.1.
amster
attribute:clientSecret
- Authentication Endpoint URL
-
OAuth authentication endpoint URL
This is the URL endpoint for OAuth authentication provided by the OAuth Identity Provider.
For example, you might set this property to: https://oauth.vk.com/authorize
Default value:
https://oauth.vk.com/authorize
amster
attribute:authorizationEndpoint
- Access Token Endpoint URL
-
OAuth access token endpoint URL.
This is the URL endpoint for access token retrieval provided by the OAuth Identity Provider. Refer to RFC 6749, section 3.2.
For example, you might set this property to: https://oauth.vk.com/access_token
Default value:
https://oauth.vk.com/access_token
amster
attribute:tokenEndpoint
- User Profile Service URL
-
User profile information URL
This URL endpoint provides user profile information and is provided by the OAuth Identity Provider. Note that this URL should return JSON objects in response.
For example, you might set this property to: https://api.vk.com/method/users.get?fields=photo_50
Default value:
https://api.vk.com/method/users.get?fields=photo_50
amster
attribute:userInfoEndpoint
- Token Introspection Endpoint URL
-
OAuth Token Introspection endpoint URL.
This is the URL endpoint for access token validation using the OAuth Identity Provider. Refer to RFC 7662.
amster
attribute:introspectEndpoint
- Redirect URL
-
amster
attribute:redirectURI
- Redirect after form post URL
-
Specify URL to redirect the form post parameters to.
amster
attribute:redirectAfterFormPostURI
- Scope Delimiter
-
The delimiter used by an auth server to separate scopes.
amster
attribute:scopeDelimiter
- OAuth Scopes
-
List of user profile properties
According to the OAuth 2.0 Authorization Framework that the client application requires. The list depends on the permissions that the resource owner grants to the client application. Some authorization servers use non-standard separators for scopes.
For example, you might set this property to: email
Default value:
email
amster
attribute:scopes
- Client Authentication Method
-
Field used to define how the client would be identified by the social provider.
Default value:
CLIENT_SECRET_POST
amster
attribute:clientAuthenticationMethod
- PKCE Method
-
The PKCE transformation method to use when making requests to the authorization endpoint.
Default value:
S256
amster
attribute:pkceMethod
- API Version
-
Version of the applicable VKontakte API.
Default value:
5.73
amster
attribute:apiVersion
- JWKS URI Endpoint
-
The JWKS URL endpoint for the RP to use when encrypting or validating
amster
attribute:jwksUriEndpoint
- JWT Signing Algorithm
-
The signing algorithm to use when signing the client assertion and request object jwt sent to social provider.
amster
attribute:jwtSigningAlgorithm
- JWT Encryption Algorithm
-
The encryption algorithm to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionAlgorithm
- JWT Encryption Method
-
The encryption method to use when encrypting the client assertion and request object jwt sent to social provider.
amster
attribute:jwtEncryptionMethod
- Private Key JWT Expiration Time (seconds)
-
The expiration time on or after which the private key JWT must not be accepted for processing.
Default value:
600
amster
attribute:privateKeyJwtExpTime
- Response Mode
-
Informs the Authorization Server of the mechanism to use for returning Authorization Response parameters.
Default value:
DEFAULT
amster
attribute:responseMode
- UI Config Properties
-
Mapping of display properties to be defined and consumed by the UI.
amster
attribute:uiConfig
- Transform Script
-
A script that takes the raw profile object as input and outputs the normalized profile object.
Default value:
403cf226-6051-4368-8b72-9ba14f9a5140
amster
attribute:transform
twitterConfig
- Enabled
-
Default value:
true
amster
attribute:enabled
- Auth ID Key
-
Field used to identify a user by the social provider.
For example, you might set this property to: id_str
Default value:
id_str
amster
attribute:authenticationIdKey
- Client ID
-
OAuth client_id parameter.
For more information on the OAuth client_id parameter, refer to RFC 6749, section 2.2.
amster
attribute:clientId
- Client Secret
-
OAuth client_secret parameter.
For more information on the OAuth client_secret parameter, refer to RFC 6749, section 2.3.1.
amster
attribute:clientSecret
- Authentication Endpoint URL
-
OAuth authentication endpoint URL
This is the URL endpoint for OAuth authentication provided by the OAuth Identity Provider.
Default value:
https://api.twitter.com/oauth/authenticate
amster
attribute:authorizationEndpoint
- Access Token Endpoint URL
-
OAuth access token endpoint URL.
This is the URL endpoint for access token retrieval provided by the OAuth Identity Provider. Refer to RFC 6749, section 3.2.
Default value:
https://api.twitter.com/oauth/access_token
amster
attribute:tokenEndpoint
- User Profile Service URL
-
User profile information URL
This URL endpoint provides user profile information and is provided by the OAuth Identity Provider. Note that this URL should return JSON objects in response.
Default value:
https://api.twitter.com/1.1/account/verify_credentials.json
amster
attribute:userInfoEndpoint
- Redirect URL
-
amster
attribute:redirectURI
- Request Token Endpoint
-
The endpoint for obtaining an access token.
Default value:
https://api.twitter.com/oauth/request_token
amster
attribute:requestTokenEndpoint
- UI Config Properties
-
Mapping of display properties to be defined and consumed by the UI.
amster
attribute:uiConfig
- Transform Script
-
A script that takes the raw profile object as input and outputs the normalized profile object.
Default value:
8e298710-b55e-4085-a464-88a375a4004b
amster
attribute:transform
Transaction Authentication Service
The following settings are available in this service:
- Time to Live
-
The number of seconds within which the transaction must be completed.
amster
attribute:timeToLive
User
Dynamic Attributes
The following settings appear on the Dynamic Attributes tab:
- User Preferred Timezone
-
Time zone for accessing the AM admin UI.
amster
attribute:preferredTimezone
- Administrator DN Starting View
-
Specifies the DN for the initial screen when an administrator successfully logs in to the AM admin UI.
amster
attribute:adminDNStartingView
- Default User Status
-
Inactive users cannot authenticate, though Identity Cloud stores their profiles.
The possible values for this property are:
-
Active
-
Inactive
amster
attribute:defaultUserStatus
-
Self Service Trees
Validation Service
The following settings are available in this service:
- Valid goto URL Resources
-
List of valid goto URL resources.
Specifies a list of valid URLs for the
goto
andgotoOnFail
query string parameters. AM only redirects a user after log in or log out to a URL in this list. If the URL is not in the list, AM redirects to either the user profile page, or the administration console. If this property is not set, AM will only allow URLs that match its domain; for example,domain-of-am-instance.com
. Use the*
wildcard to match all characters except?
.Examples:
amster
attribute:validGotoDestinations
WebAuthn Profile Encryption Service
The following settings are available in this service:
- Profile Storage Attribute
-
The user’s attribute in which to store WebAuthn profiles.
amster
attribute:webauthnAttrName
- Device Profile Encryption Scheme
-
Encryption scheme to use to secure device profiles stored on the server.
If enabled, each device profile is encrypted using a unique random secret key using the given strength of AES encryption in CBC mode with PKCS#5 padding. An HMAC-SHA of the given strength (truncated to half-size) is used to ensure integrity protection and authenticated encryption. The unique random key is encrypted with the given RSA key pair and stored with the device profile.
Note: AES-256 may require installation of the JCE Unlimited Strength policy files.
The possible values for this property are:
-
Label: AES-256/HMAC-SHA-512 with RSA Key Wrapping (Value:
RSAES_AES256CBC_HS512
) -
Label: AES-128/HMAC-SHA-256 with RSA Key Wrapping (Value:
RSAES_AES128CBC_HS256
) -
Label: No encryption of device settings. (Value:
NONE
)
amster
attribute:authenticatorWebAuthnDeviceSettingsEncryptionScheme
-
- Encryption Key Store
-
Path to the key store from which to load encryption keys.
Updating this setting is currently not supported in Identity Cloud. Changing its value may lead to a loss of functionality in this feature.
The configuration will be migrated in the future to support customization of keys using ESVs. For more information, please contact your ForgeRock representative.
amster
attribute:authenticatorWebAuthnDeviceSettingsEncryptionKeystore
- Key Store Type
-
Type of key store to load.
Refer to the JDK 8 PKCS#11 Reference Guide for more details.
The possible values for this property are:
-
Label: Java Key Store (JKS). (Value:
JKS
) -
Label: Java Cryptography Extension Key Store (JCEKS). (Value:
JCEKS
) -
Label: PKCS#11 Hardware Crypto Storage. (Value:
PKCS11
) -
Label: PKCS#12 Key Store. (Value:
PKCS12
)
amster
attribute:authenticatorWebAuthnDeviceSettingsEncryptionKeystoreType
-
- Key Store Password
-
Password to unlock the key store. This password is encrypted when it is saved in the Identity Cloud configuration.
amster
attribute:authenticatorWebAuthnDeviceSettingsEncryptionKeystorePassword
- Key-Pair Alias
-
Alias of the certificate and private key in the key store. The private key is used to encrypt and decrypt device profiles.
amster
attribute:authenticatorWebAuthnDeviceSettingsEncryptionKeystoreKeyPairAlias
- Private Key Password
-
Password to unlock the private key.
amster
attribute:authenticatorWebAuthnDeviceSettingsEncryptionKeystorePrivateKeyPassword