Relying party endpoints for authentication
A Secure Verify Access OpenID Connect Relying Party (RP) federation uses two URL endpoints.
- Initiation or Kickoff URL
- The user accesses this URL to initiate an OpenID Connect (OIDC) federated single sign-on. Access to this URL results in a redirect to the /authorize endpoint of the configured OIDC Provider.
https://<reverseproxy_host, port, junction>/sps/oidc/rp/<federation name>/kickoff/<partner name>
This endpoint supports providing a Target parameter. A Target query string parameter can be provided to define a location to redirect the user after a successful authentication. An example location is an application's landing page. This target must be a fully qualified URL containing protocol, host, and path information.
For example, with a junction of /isam, a federation of my_federation and a partner of partner_company, the URL is:
https://my.webseal.com/isam/sps/oidc/rp/my_federation/kickoff/partner_company- Reentry or Redirect URL
After the request to /authorize is made through the Kickoff URL, the user is redirected back to the RP through the Redirect URI. The URI value is included in the request to /authorize.
https://<reverseproxy host, port, junction>/sps/oidc/rp/<federation name>/redirect/<partner name>
The Redirect URL must be configured on the OIDC Provider. If this URL is accessed without a session state existing (that is, without first accessing the Kickoff URL), an error occurs. Assuming a successful flow, the user is authenticated after this URL is accessed.
For example, with a junction of /isam, a federation of my_federation and a partner of partner_company, the URL is:
https://my.webseal.com/isam/sps/oidc/rp/my_federation/redirect/partner_company
Parent topic: Authentication with OpenID Connect Relying Party