OIDC SSO: explain login-page and disabling local login TW-2642#10766
OIDC SSO: explain login-page and disabling local login TW-2642#10766Karuna-Mendix wants to merge 4 commits intodevelopmentfrom
Conversation
content/en/docs/marketplace/platform-supported-content/modules/oidc.md
Outdated
Show resolved
Hide resolved
content/en/docs/marketplace/platform-supported-content/modules/oidc.md
Outdated
Show resolved
Hide resolved
content/en/docs/marketplace/platform-supported-content/modules/oidc.md
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
since we don't recommend the use of Anonymous role, Wouldn't it be more consistent if we could remove this explanation?
|
|
||
| The OIDC SSO module works without a specified sign-in page. Therefore, in the navigation section of your app, set **Sign-in page** (in the **Authentication** section) to *none*. | ||
|
|
||
| If you are configuring navigation for web/responsive apps and want to allow your end-users to choose from a number of different IdPs (multiple IdPs), or to have the option to sign in back into the app after they have signed out, set a **Role-based home page** for role **Anonymous** to **OIDC.Login_Web_Button**. When configuring navigation for PWA apps, set the **Role-based home page** for the **Anonymous** role to `OIDC.Login_PWA_Online_Button` for online apps and `Login_PWA_Offline_Button` for offline apps. See [Role-Based Home Pages](/refguide/navigation/#role-based) in *Navigation* for more information. |
There was a problem hiding this comment.
Hi @JaapF, do you have a comment on this section which is removed? CC @murat-ustabas-mx
There was a problem hiding this comment.
Yes, makes sense to remove this, given the fact that we are removing anonymous page.
I trust Murat has reviewed this PR as well?
|
|
||
| {{% alert color="warning" %}} | ||
| Enabling anonymous users introduces a broader attack surface. If you choose this option, follow Mendix guidelines for [setting up anonymous user security](/howto/security/set-up-anonymous-user-security/) to mitigate potential risks. | ||
| In OIDC SSO version 4.1.0 and above, you do not have to enable anonymous users for multiple IdPs. You can remove the `Anonymous` User Role from the module. |
There was a problem hiding this comment.
maybe add: "Also you may want to check if the Anonymous user role can be removed from your app. Not using an anonymous role if not needed is a best security practice."
| 2. Select *Anonymous* as the **Anonymous user role** | ||
|
|
||
| {{< figure src="/attachments/appstore/platform-supported-content/modules/oidc/anonymous-user.png" class="no-border" >}} | ||
| If multiple IdPs are configured in the OIDC module, end users can access the same URL (`<your-app-url>/oauth/v2/login`) to initiate authentication. In this case, they will first be redirected to an IdP selection page, where they can choose the IdP they want to use for authentication. |
There was a problem hiding this comment.
I think we need somethjing like:
"If multiple IdPs are configured in the OIDC module, 2 mechanisms for selecting the IdP are supported:
- (1) depending on deeplink, your application logic may redirect to a IdP-specific endpoint (see XXX / more details needed).
- (2) endusers makes the selection. In this case, your app logic can use (
<your-app-url>/oauth/v2/login) to initiate authentication. End-users will first be redirected to an IdP selection page, where they can choose the IdP they want to use for authentication."
Maybe @murat-ustabas-mx can add some more details.
https://mendix.atlassian.net/browse/TW-2642