Configure OpenID Connect (OIDC) for your application to enable it as a method for invoking flows.
- Click the Applications tab.
- Find the application and click Edit.
- Click the OIDC tab.
- Optional:
Click Regenerate Client Secret to create a new client
secret.
Generating a new client secret invalidates the previous secret.
- Reveal and copy the Client Secret for use in OIDC connections.
- In the Redirect URLs field, enter one or more redirect URLs for the application.
- In the Logout URLs field, enter one or more logout URLs for the application.
-
In the Scopes section, select one or more scopes based
on your application's needs.
Option Description OIDC Select the OIDC check box.
Profile Select the Profile check box.
Flow Analytics Select the Flow Analytics check box.
-
In the Grants section, select one or more grants based
on your application's needs.
Option Description Authorization Code Select the Authorization Code check box.
Implicit Select the Implicit check box.
Client Credentials Select the Client Credentials check box.
- Copy the Issuer.
- Copy the Token Endpoint.
- Copy the UserInfo Endpoint.
- Copy the JWKS Endpoint.
- Copy the JWKS.
- Click the Enforce receiving signed requests? toggle to require that incoming requests be signed.
-
Provide a method for verifying service provider JSON web key sets (JWKS):
- In the Service Provider (SP) JWKS URL field, enter a URL.
- In the Service Provider (SP) JWKS Keys to Verify Authorization Request Signature field, enter one or more keys.
- Click Apply.