41 OIDC Client Integrations with Social Identity Providers
OAM ships an out-of-the box OIDC Client Authentication Plugin, OpenIDConnectPlugin that enables integration with Social Identity providers such as IDCS, Google and Facebook.
Apart from being an OAuth/OpenIDConnect2.0 Server, Oracle Access Manager (OAM) can also delegate authentication to OpenIDConnect-Social Identity Providers such as IDCS, Google, Facebook or even OAM itself, thus behaving like a relying party (service provider). After authenticating the user, the IDP redirects back to OAM where the user is asserted by OAM and an OAM Session is created.
The authentication process is described as follows:
-
The OpenIDConnectPlugin redirects the authentication request to any third-party Identity Provider using OIDC protocol.
-
The third-party Identity Provider (IDP) authenticates the user.
-
The IDP redirects the authentication request back to OAM.
-
The OAM asserts the user.
-
The OAM creates a session.

Description of the illustration aiaag_oidc_authentication_flow.png
41.1 About the OpenIDConnectPlugin
OpenIDConnectPlugin is a generic plugin that you can integrate with any OpenId2.0 providers. This plugin redirects requests to the IDP it is integrated with. After authenticating the user at the IDP, the control is submitted back to the OAM server
The mandatory parameters for plugin configuration include oauth_client_id, oauth_client_secret, and provider.
Table 41-1 OpenIDConnectPlugin: Parameters for plugin configuration
Field | Sample Value | Mandatory / Optional | Description | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
id_domain |
Optional |
Enter the Identity domain. It is required for integration with OAM as an IDP since all the artifacts (client) are created under the Identity Domain in OAM. |
|||||||||||||
oauth_client_secret |
12312312312asdasdasd1231231sdsadasd |
Mandatory |
Enter OAuth client secret. |
||||||||||||
token_end_point |
Optional |
Enter the access token endpoint, it is required ONLY if the IDP does not support Discovery URL. |
|||||||||||||
authz_end_point |
Optional |
Enter the authorization endpoint, (required ONLY if the IDP does not support Discovery URL) |
|||||||||||||
require_proxy |
Optional |
Set it to false, if the plugin does not use the proxy configuration and redirects directly to the IDP. Note: If proxy is required to connect to the IDP, add this setting before starting the server: Dhttp.proxy.Host=www-proxy.example.com -Dhttp.proxy.Port=80 |
|||||||||||||
provider |
or oam or idcs |
Mandatory |
For this patch release, use only Facebook or oam or idcs as provider values for the following reasons:
Note: For other OpenID2.0 compliant providers such as google, you can use any key. |
||||||||||||
scope |
Optional |
The default “scope” sent to the IDP is openid email. If this has to be overwritten, we can set the new scope via this plugin parameter. |
|||||||||||||
additional_parameters |
attributes=profile,email;protocol=http;namespace=oidc | Optional |
Specify the following additional attributes and values. Use semicolon (
; ) to delimit the attributes and comma (, ) to delimt the values.
Note: By default,https is used if the protocol is not specified.
|
||||||||||||
userinfo_end_point |
http://graph.facebook.com/me |
Optional |
Enter the userinfo token endpoint, it is required ONLY if the IDP does not support Discovery URL. |
||||||||||||
discovery_url |
Mandatory |
Enter the discovery URL at the IDP-end with the format, http(s)://URL host. It provides authorization, token, and userinfo endpoints information. The base URL, /.well-known/openid-configuration is appended to the discover URL for building the expected format of http(s)://URL host/.well-known/openid-configuration. The plugin fetches authorization, token and userinfo endpoints from this discovery URL and redirects to the same. |
|||||||||||||
username_attr |
This parameter indicates, which attribute should be read from the Identity Token.
|
||||||||||||||
oauth_client_id |
asdad11sdfasda131231asdas |
Mandatory |
Enter OAuth client id. |
There is no dependency between the provider and the expected key value. The new plugin parameter, username_attr indicates the attribute to be read from the Identity Token.
Note:
Add DUseSunHttpHandler=true before starting the server. When it is set to true, the plugin connects to the external IDP through the backchannel and fetches token and userinfo details.41.2 Authentication Module and Scheme and Policy Changes
Create a new authentication module that consists of two steps:
-
OpenIDConnectPlugin
-
UserIdentificationPlugin

Description of the illustration aiaag_oidc_authmod_steps.png

Description of the illustration aiaag_oidc_authmod_stepsorch.png
UserIdentificationPlugin is required as the second Step. Before the OAM session creation, the user authenticated by the IDP needs to be asserted by OAM. The User Attribute returned in the Identity Token varies for providers. The user attribute could be subject which is the uid or displayname or email attribute.
In OAM, assert this user in the IDStore by modifying the KEY_LDAP_FILTER as described in the following table:
Assumption: The user authenticated at IDP must exist in the OAM–ID Store.

Description of the illustration aiaag_oidc_authmod_stepdetails.png
Table 41-2 UserIdentificationPlugin: Parameters to modify filters
Provider | User Attribute returned by OpenIDConnectPlugin | Filter |
---|---|---|
|
Sub returns displayname |
&(objectclass=inetorgperson)(DISPLAYNAME={KEY_USERNAME}) It indicates that the LDAP search needs to be performed for a user with the given displayname. |
OAM |
Sub which returns uid, the default attribute configured |
Default email attribute is not supported. |
IDCS |
Sub returns email |
&(objectclass=inetorgperson)(MAIL={KEY_USERNAME}) |
|
Email returns email |
&(objectclass=inetorgperson)(MAIL={KEY_USERNAME}) |
41.3 Authentication Scheme Changes
Create a new Authentication scheme that uses the module created in the previous section
For this new Authentication scheme, set the challenge parameter initial_command=NONE so that the control is passed to the plugin

Description of the illustration aiaag_oidc_authscheme_fbscheme.png
41.4 Policy Changes
Modify the authentication policy in the application domain of the protected resource to use the scheme created in Authentication Scheme Changes. When you access a protected-resource, the control is given to this module. The OpenIDConnectPlugin redirects to the IDP endpoint. After authenticating at the IDP, when control is submitted back to the server, the UserIdentificationplugin asserts the user and the session are created in OAM.
41.5 Integration with IDCS
41.6 Integration with Google
- Create a client on
console.developers.google.com
as shown in the following figure: - Make a note of the
client_id
andclient_secret
. - Provide endpoint on the OAM server as
redirect_uri
for the client. Credentials are submitted at this endpoint, for examplehttp(s)://OAM Host:port/oam/server/auth_cred_submit
.
Description of the illustration aiaag_oidc_integr_google_1.png - Set the following configuration parameters for OpenIDConnectPlugin:
Description of the illustration aiaag_oidc_integr_google_2.png - Verify that the user exists in the IDStore in OAM.
Description of the illustration aiaag_oidc_integr_google_3.png - Access the protected-resource.
- Get redirected to the Google login page for authentication.
41.7 Integration with Facebook
- Create a client on
developers.facebook.com
as shown in the following figure:
Description of the illustration ms_oamathn_sp.gif - Make a note of the
client_id
andclient_secret
.
Description of the illustration aiaag_oidc_integr_fb_2.png - Provide endpoint on the OAM server as
redirect_uri
for the client. Credentials are submitted at this endpoint, for examplehttp(s)://OAM Host:port/oam/server/auth_cred_submit
.
Description of the illustration aiaag_oidc_integr_fb_3.png - Set the following configuration parameters for OpenIDConnectPlugin:
Description of the illustration aiaag_oidc_integr_fb_4.png - Verify that the user exists in the IDStore in OAM.
Description of the illustration aiaag_oidc_integr_fb_5.png - Access the protected-resource.
- Get redirected to the Facebook login page for authentication.