Adding an OAuth 2.0 identity provider
Add an Open Authorization (OAuth) 2.0 identity provider to your tenant.
Overview
Flow allows you to delegate flow user authentication to an OAuth 2.0 identity provider (IdP). For example, you can use this to apply SSO (Single Sign On) authentication to your flows.
Any flow protected with OAuth identity provider authentication will act as a relaying party to accept an OAuth access token issued by the OAuth IdP. This means that users can only access the flow once they have successfully signed in through the identity provider.
Flow supports OAuth 2.0 authorization only. OAuth 2.0 is not backwards compatible with OAuth 1.0 or 1.0a.
-
When a flow protected by an OAuth identity provider is executed, the user is redirected to the identity provider to sign in.
-
Once the user has successfully signed in to the identity provider, they are redirected back to the flow with an OAuth 2.0 access token.
-
The flow checks if the access token is valid. If it is valid the user is signed in to the flow.
Before you begin
Before adding an OAuth identity provider, you will need to have created an application in the IdP service, added at least one user, and copied a number of values to use during installation. You will need these values:
-
Client ID
-
Client Secret key
-
Well Known URL
-
Allowed Audience
Redirect URI: If required, the Redirect URI endpoint for an IdP service using a OAuth identity provider is:
Adding an OAuth identity provider
To add an OAuth identity provider to your tenant:
-
On the Home tab, select Identity Providers from the main menu.
-
The Identity Providers page is shown. Any existing identity providers that you have set up are displayed on the page. Click New Identity Provider.
-
Name: Enter a name for the identity provider.
-
Type: Select "Oauth2" from the drop-down menu. Additional fields are now shown, allowing you to configure the identity provider.
-
Client ID: The full Client ID obtained from your IdP application. The Client ID is the public identifier required for all OAuth protected flows.
-
Client Secret: The full Client Secret key obtained from your IdP application. For security reasons, previously added keys are not shown.
-
Well Known URL: The Well Known configuration URL for the IdP authorization server. This metadata declares the endpoint locations and capabilities of the authorization server.
Example: "https://www.example.com/auth/realms/master/.well-known/openid-configuration"
-
Allowed Audience: The audience (resource URI or server) for the access token. This must match the
"aud"claim in the access token. -
Resource: Some IdPs such as Microsoft Azure AD allow you to specify where the resource/data belongs, to control access to this resource/data. This field can be left blank if this feature is not used or required by your IdP.
-
Send Access Token to Connectors: Enable this setting to send the access token of the OAuth2 identity provider runtime user in a connector request. Requests made to a connector in a flow will then include an additional
x-boomi-flow-user-access-tokenrequest header. This optional setting is disabled by default. -
Custom Attribute Mappings: These fields allow you to enter custom Attribute names, to customize the default attribute mappings. Enter a new attribute mapping name in the Claim Name field for each attribute as required.
-
Comments: Enter comments or any useful information about this identity provider configuration.
-
Click Save.
-
You are returned to the Identity Providers page, with the new OAuth identity provider shown in the table.
Next steps
You can now apply authentication to flows in your tenant using the identity provider as required, either to control access to an entire flow, or by using swimlanes to control access to specific sections of a flow.