-
Notifications
You must be signed in to change notification settings - Fork 1
CI Logon
The CILogon provides a standards-compliant OpenID Connect (OAuth 2.0) interface https://www.cilogon.org/oidc
Register your app at https://cilogon.org/oauth2/register
Check "org.cilogon.userinfo" in the scopes section/.
Take a note of the callback url that you submitted (e.g. https://thanos.vmhost.psu.edu/valid/redirect_uri).
Record the client identifier and client Secret.
You will receive an email from CILogon once your app is approved.
Go to the pegr configuration file, e.g. /usr/local/pegr/pegr-config.properties, and set
sso.url=<HOST>/sso
sos.type=Header
sso.principle=OIDC_CLAIM_eppn
-
Download cjose from https://github.com/OpenIDC/mod_auth_openidc/releases/download/v2.4.0/cjose-0.6.1.5-2.el7.x86_64.rpm and install
$ sudo rpm -ivh cjose-0.6.1.5-2.el8.x86_64.rpm
-
Download hiredis from http://rpmfind.net/linux/remi/enterprise/8/remi/x86_64/hiredis-0.13.3-9.el8.remi.x86_64.rpm and install
$ sudo rpm -ivh hiredis-0.13.3-9.el8.remi.x86_64.rpm
-
Download openidc mod from https://github.com/OpenIDC/mod_auth_openidc/releases/download/v2.4.14.2/mod_auth_openidc-2.4.14.2-1.el8.x86_64.rpm and install
$ sudo rpm -ivh mod_auth_openidc-2.4.14.2-1.el8.x86_64.rpm
Create file /etc/httpd/openidc.d/openidc.conf
#LoadModule auth_openidc_module modules/mod_auth_openidc.so
OIDCProviderMetadataURL https://cilogon.org/.well-known/openid-configuration
OIDCScope "openid email profile org.cilogon.userinfo"
OIDCClientID "cilogon:/client_id/XXXXXXXXXXXXXXXXXXXX"
OIDCClientSecret "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"
OIDCCryptoPassphrase "XXXXXXXXXXXXXXXXXX"
# For debugging/seeing session info. Can be removed for production:
OIDCInfoHook iat access_token access_token_expires id_token userinfo refresh_token session
OIDCRedirectURI https://thanos.vmhost.psu.edu/valid/redirect_uri
<Location /valid>
AuthType openid-connect
Require valid-user
</Location>
<Location /sso>
AuthType openid-connect
Require valid-user
</Location>
<Location /pegr>
AuthType openid-connect
Require valid-user
OIDCUnAuthAction pass
</Location>