Custom OIDC
BlokSec can be configured as an inbound federation identity provider (a.k.a. social provider) for your Open ID Connect (OIDC) application to provide your users with secure, passwordless authentication. The following article describes the process to configure authentication for OIDC.
BlokSec Admin UI
-
Sign into BlokSec admin UI as a user with admin privileges for your tenant
-
On the main dashboard, click the Add Application drop-down and select Create Custom
-
Complete the application details as follows and submit:
-
Name: Your desired application name (we will assume this is called ‘Acme App’ for the remainder of this article)
-
SSO Type: Select OpenID Connect
-
Logo URI: Loation of the image URL (For example : https://bloksec.io/images/appLogo.png)
-
Backgroun URI: Location of the brackground image URL (For example : https://bloksec.io/images/appLogoBackground.png)
-
Session Length: Length of the authenticated session. Default value is set to 60 minutes.
-
Redirect URIs: <provide your applications redirect URL (e.g., http://localhost:3000/callback or https://yourappdomain.com/callback)
-
Post Logout Redirect URIs: <provide the URL to redirect users upon logout (e.g., http://localhost:3000 or https://yourappdomain.com) >
-
Select Submit to save the configuration
-
-
Once saved, click back into the newly created application to open the application configuration
-
Click Generate App Secret, then make note of the Application ID and Application Secret as these will be required when registering your application with BlokSec