Hi All,
I've been playing around with the latest ISAM version, more specifically the new oidc authentication method.
I have configured two OpenID Providers, where the redirects seem to work when I provide iss=google, iss=is4u, ... in the form.
The problem exists when I set up a default-op, in this case I point to "google".
As I said earlier, the redirect to the provider works, however when WebSEAL attempts to exchange the code for tokens, it will exchange them at the "default-op" token endpoint? Making it that the user is unable to authenticate.
Is this expected behavior? It seems to indicate to work with multiple providers, however always exchanging at the default-op is strange.
Furthermore, WebSEAL appended the local OP in the state:
state=****:google, state=****:is4u, ...
Some side notes:
Setting default-op to "default" causes:
DPWAD0412E The configuration entry found within the oidc stanza was not valid: default-op = default.
Instance can not be started.
Commeting out "default-op" causes:
HPDPZ0028E The configuration file /var/pdweb/webseal-test/etc/webseald-webseal-test.conf is missing the required attribute default-op in stanza oidc.
--> although the knowledge center state this value is optional:
https://www.ibm.com/support/knowledgecenter/SSPREK_9.0.5/com.ibm.isam.doc/wrp_stza_ref/reference/ref_oidc_default_op.htmlInstance can not be started.
Assigning "default" to "default-op" and providing an empty configuration for "default", causes the instance to not start either.
Any clarification on this behavior?
------------------------------
Dries Eestermans
IS4U
------------------------------