OpenID Connect Configurations Overview

JFrog Platform Administration Documentation

Content Type
Administration / Platform
ft:sourceType
Paligo

Using OpenID Connect, the JFrog Platform acts as a service provider that receives users' authentication information from external identity providers. JFrog Platform OIDC integrations connect the JFrog Platform with other services that use OpenID. In this case, JFrog is no longer responsible for the authentication of the user although it still has to redirect the login request to the identity provider and verify the integrity of the identity provider’s response.

You can create, edit, delete, and view the JFrog Platform OIDC integrations that connect the JFrog Platform with other services using OpenID.

To view the OIDC providers you have configured, go to General Managment | Manage Integrations. The list of OIDC provider configurations defined in Artifactory is displayed in the list section.

oidc-integrations-02.png

You can add new OIDC provider configurations, or edit or delete existing ones.

The following table describes the settings displayed for providers:

Item

Description

Name

The name given to the JFrog OIDC integration.

Description

A short description given to the OIDC integration.

Provider Type

The type of provider for which you created an OIDC integration.

Provider URL

The OIDC service provider name. This should be a URL that is also known as the entityID, providerID, or entity identity.

Identity Mapping

The number of identity mappings that are associated with the OIDC integration.

Azure App ID

If the application has custom signing keys as a result of using the claims-mapping feature, you must provide the Azure App ID. See the Azure documentation to learn more. (only relevant for Azure provider type)

Organization

Your GitHub organization name. (Only relevant for GitHub provider type, Starting from Artifactory version 7.110.1)

Enable Permissive Configuration

Allows authentication without organization restrictions. For security best practices, it is recommended to add restrictions to limit access and enforce stricter controls. (Only relevant for GitHub provider type, Starting from Artifactory version 7.110.1)