Modifying a Microsoft Azure OIDC OP for WebSphere Application Server and Liberty clients. This example shows how to modify an existing Microsoft ®️ Azure™️ app registration to add a WebSphere™️ traditional or Liberty OIDC relying parties (RP). The steps are similar for the Entra™️ ID console.
Here are some links from Microsoft that contain more detailed configuration information:
- Quickstart: Set up a tenant
- Quickstart: Register an application with the Microsoft identity platform
- Quickstart: Configure an application to expose a web API
- Quickstart: Configure a client application to access a web API
The Azure AD application configuration and OIDC RP configurations work in concert with each other. The Azure config requires a redirect URL from the RP. The RP configuration requires the client ID, client secret, and discovery URL from the Azure configuration. Whichever configuration you choose to do first, you must go back and edit that configuration using information from the second. For instance, if you configure Azure first, after configuring the RP, you go back into your Azure config and add the redirect URL.
If the RP (WebSphere traditional or Liberty) and Azure administration roles are separated in your organization, it is best to perform the RP configuration first, then provide the redirect URL to your Azure administrator. The Azure administrator then returns the client ID, client secret, and discovery URL to you.
-
For WebSphere Application Server Traditional, see Configuring an OpenID Connect Relying Party and OpenID Connect Relying Party custom properties.
- On the Import the OpenID connect provider's SSL signer certificate to the WebSphere Application Server truststore step, use the following data:
- host: login.microsoftonline.com
- port: 443
- On the Import the OpenID connect provider's SSL signer certificate to the WebSphere Application Server truststore step, use the following data:
-
For Liberty, see Configuring an OpenID Connect Client in Liberty
- On the step to Configure the truststore of the server to include the signer certificates of the OpenID Connect Providers that are supported using the Adding trusted certificates in Liberty topic in IBMDOCS, the signer certificate that you want is for the following endpoint:
- https://login.microsoftonline.com/{tenant}/oauth2/v2.0/token
- Where {tenant} is the name of your tenant.
- On the step to Configure the truststore of the server to include the signer certificates of the OpenID Connect Providers that are supported using the Adding trusted certificates in Liberty topic in IBMDOCS, the signer certificate that you want is for the following endpoint:
-
The Redirect URI that you will use for the RP when configuring Azure is https://(hostname):(port)/(contextRoot)/(identifier), where:
- (hostname):(port):
- The hostname and SSL port of the WebSphere or Liberty server.
- (contextRoot):
- Liberty :
- Replace the value with oidcclient/redirect
- WebSphere traditional:
- The default value is oidcclient
- This is the context root of WebsphereOIDCRP ear
- To find the value, in the Administrative console, navigate to All Applications > WebsphereOIDCRP > Context Root for Web Modules
- If you installed the OIDC ear using deployOidc.py for use with the admin console, then you want to look for WebsphereOIDCRP_Admin instead of WebsphereOIDCRP
- Liberty :
- (identifier)
- Liberty: the value for the id attribute of your openidConnectClient configuration.
- WebSphere traditional: the value for the provider_(id).identifier OIDC TAI custom property.
- Examples :
- Liberty: https://test.co:9443/oidcclient/redirect/RP1
- Websphere traditional: https://test.co:9443/oidcclient/RP1
- (hostname):(port):
-
Login to the Azure portal at https://portal.azure.com.
-
If you have access to multiple tenants, perform the following actions to choose the tenant in which you want to register the application:
-
In the search box in the menu bar at the top, search for Azure Active Directory then click Azure Active Directory
-
Under Manage in the menu on the left, click App Regsistrations
-
Click the application that you want to use.
Note values to use when when configuring WebSphere or Liberty later in this task.
- The values for the client ID and tenant ID
- Your discovery URL is https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration
- where {tenant} is the name of your tenant.
-
Click the link next to Client credentials
-
Enter a description for your new secret and the expiration, then click Add
-
Caution: Be sure to note the value that is generated for the client secret to use when configuring WebSphere or Liberty later in this task. You might not see this value again later.
Under Manage, click Authentication
- If the Web platform already exists:
- Otherwise, if the Web platform does not exist:
- Click Add a platform
- Click Web
- Fill in the information on the Configure Web panel:
- Redirect URI: https://(hostname):(port)/(contextRoot)/(identifier)
- If you have your redirect URI, enter it now.
- Otherwise, see the Before you begin section for how to determine your redirect URI.
- Implicit grant and hybrid flows:
- Check both Access tokens and ID tokens
- Redirect URI: https://(hostname):(port)/(contextRoot)/(identifier)
- Click Configure
-
Use the client ID, client secret, and discovery URL to complete your OIDC configuration on WebSphere or Liberty
- For WebSphere Application Server Traditional, see OpenID Connect Relying Party custom properties.
- For Liberty, see Configuring an OpenID Connect Client in Liberty.
-
(Optional): If your RP is WebSphere traditional:
-
See the Configuring the OIDC TAI to perform RP-Initiated Logout task in IBMDOCs to determine if you want to use RP-Initiated logout.
-
If you want to perform RP-Initiated logout, perform the configuration on WebSphere, then use the provider_(id).endSessionRedirectUrl to complete configuration in Azure:
-
Login to the Azure portal at https://portal.azure.com.
-
If you have access to multiple tenants, perform the following actions to choose the in which your application definition resides:
-
Click More services > Azure Active Directory
-
Under Manage, click App registrations
-
Click the application that you want to update.
-
Under Manage, click Authentication.
-
In the Platform configurations panel, enter your endSessionRedirectUrl in the Front-channel logout URL field, then click Save.
-
-