You configure an IdP authentication policy to chain the HTML Form Adapter instance and an authentication policy contract. Then the policy contract can harness attribute values returned by the HTML Form Adapter instance for multiple browser-based single sign-on (SSO) use cases through service provider (SP) connections, OAuth authorization code flow, and OAuth implicit flow.

The following procedure offers an example of how you could enhance the sign-on experience by giving users the option to authenticate with their local accounts or their existing accounts on a major social network to which you have already established an IdP connection. In this example, the social network is named "ACME".

Tip:

You can also deploy and configure Cloud Identity Connectors to support identities from Facebook, Google, LinkedIn, or Twitter.

  1. Verify that the IdP connection to ACME returns the attributes required to complete the browser-based SSO use cases.
  2. Note which authentication policy contract your policy uses.
  3. Create a local identity profile:
    1. Go to Authentication > Policies > Local Identity Profiles. Click Create New Profile.
    2. On the Profile Info tab, in the Local Identity Profile Name field, enter a name.
    3. From the Authentication Policy Contract, select the authentication policy contract from step 2. Click Next.
    4. On the Authentication Sources tab, under Authentication Source, enter ACME, and then click Add. Click Done.
      Note:

      To support additional third-party identity providers, enter a value for each. At runtime, the sign-on page displays them in the order defined on this window.

  4. Configure the HTML Form Adapter instance for customer identities:
    1. Go to Integration > IdP Adapters.
    2. On the IdP Adapters window, from the Instance Name list, click the HTMLFormAdapter instance.
    3. On the IdP Adapter tab, from the Local Identity Profile list, select a local identity profile.
    4. Complete the rest of the configuration and save all changes.
  5. Modify your existing IdP authentication policy:
    1. Go to Authentication > Policies > Policies.
    2. On the Policies tab, in the Policy section, click the existing IdP policy.
    3. In the Success path of the HTML Form Adapter instance, click Rules.
    4. In the Rules dialog, create a policy path for users who choose to authenticate with ACME. For this example, configure the fields as shown in the following table.
      Attribute Name Condition Value Result

      policy.action

      equal to

      ACME

      Important:

      The value here must match the value defined on the Authentication Sources tab. See step 3d.

      ACME users

      Note:

      The Result field controls the label shown for the policy path of this rule. The value does not need to match the value defined on the Authentication Sources window.

      Important:

      If you have defined multiple third-party identity providers on the Authentication Sources tab, you must repeat these steps to add a policy.action rule to create a policy path for each.

      In addition, ensure the Default to Success check box is selected. When selected, the Success path remains, which is important when users can also authenticate using their local accounts, like in this example.

    5. Click Done.
      This returns you to the Authentication Policies window.
    6. For the ACME users path, under Action, select the IdP connection to ACME.
      Tip:

      Generally, any IdP adapter instance or IdP connection that connects to the third-party identity provider can be used here.

    7. For the ACME Fail path, select Done.
      Note:

      If you have defined multiple third-party identity providers and added rules to create a policy path for each, you can select Restart. The Restart policy action provides users the opportunity to do over. When triggered, the policy engine routes the requests back to the first checkpoint of the invoked authentication policy. By selecting Restart for the Fail path, you give users the opportunity to choose another third-party identity provider if they fail to authenticate through ACME.

    8. For the ACME Success path, select the local identity profile created in step 3, and then complete the Local Identity Mapping configuration.
      Note:

      Because this use case does not involve registration, the source of fulfillment is limited to the preceding IdP connection or IdP adapter instance, dynamic text, and attribute mapping expression, if enabled.

    9. Click Save.

After you give users the option to authenticate with ACME without enabling registration, when users sign on through this HTML Form Adapter instance, the following sign-on page is presented.

A screen capture of a sample sign-on page with an option to sign on with ACME

If you also added Facebook, Google, LinkedIn, and Twitter as authentication sources, the following sign-on page is presented.

A screen capture of a sample sign-on page with an option to sign on with ACME and more