OIDC

You can configure OIDC (OpenID Connect) for MKE 4 through the authentication section of the MKE configuration file. To enable the service, set enabled to true. The remaining fields in the authentication.oidc section are used to configure the OIDC provider.

For information on how to obtain the field values, refer to your chosen provider:

Configure MKE

The MKE configuration file authentication.oidc fields are detailed below:

FieldDescription
issuerOIDC provider root URL.
clientIDID from the IdP application configuration.
clientSecretSecret from the IdP application configuration.
redirect URIURI to which the provider will return successful authentications.

OIDC example configuration:

authentication:
  enabled: true
  oidc:
    enabled: true
    issuer: https://dev-94406016.okta.com
    clientID: 0oedtjcjrjWab3zlD5d4
    clientSecret: DFA9NYLfE1QxwCSFkZunssh2HCx16kDl41k9tIBtFZaNcqyEGle8yZPtMBesyomD
    redirectURI: http://dex.example.com:32000/callback

Test authentication flow

ℹ️
To test authentication flow, ports 5556 (dex) and 5555 (example-app) must be externally available.
  1. Navigate to http://{MKE hostname}:5555/login
  2. Click Login to display the login page.
  3. Select Log in with OIDC.
  4. Enter your credentials and click Sign In. If authentication is successful, you will be redirected to the client applications home page.