9.2 Configuring the Connector for OAuth2 Resources

You can configure instances of the OAuth2 Resources connector in one of the following ways:

(Optional) For each OAuth client application, you can manually create appmarks so the CloudAccess landing page shows an icon for connection to the OAuth2 client application. Appmarks should be configured to point to the URL of the OAuth2 client application that will start the OAuth2 authentication process.

To configure the connector for OAuth2 Resources:

  1. Log in as an administrator to the CloudAccess administration console:

    https://appliance_dns_name/appliance/index.html
    
  2. Drag and drop the OAuth Resources connector from the Applications palette to the Applications panel.

    The Configuration window opens automatically for the initial configuration. To view or reconfigure the settings later, click the connector icon, then click Configure.

  3. On the Configuration tab, provide the following information:

    • Display name: Clearly identify the connector on the Admin page of the console.

    • Schema: Specify whether the attributes that CloudAccess sends to the OAuth client follow OpenID Connect standard naming or use the Native schema names defined internally on the appliance.

    • Allowed OAuth Client URI(s): Specify the whole path or just the host name for the OAuth2 client application. Using only the host name allows all paths on that domain. Since OAuth2 depends on SSL as one of its core security mechanisms, HTTPS should always be specified. For more information about configuring redirect URIs, see the following document: http://tools.ietf.org/html/rfc6749#section-10.6.

    • OAuth Details (Client ID and Client Secret): Use this information to configure the OAuth2 client application.

    • OAuth Endpoints (Auth URL, Token URL, and Profile URL): Use this information to configure the OAuth2 client application.

  4. Click the Appmarks tab, then review and edit the default settings for the appmark.

  5. Click OK to save the configuration.

  6. On the Admin page, click Apply to commit the changes to the appliance.

  7. Wait until the configuration changes have been applied on each node of the CloudAccess cluster.

  8. (Conditional) If Public access is disabled, click Policy in the toolbar, then perform policy mapping to specify entitlements for identity source roles (groups).

    For more information, see Mapping Authorizations in the NetIQ® CloudAccess and MobileAccess Installation and Configuration Guide.

After the OAuth2 Resources connector and OAuth client application have been configured, end users can access the protected resource by browsing to the URL of the OAuth client application (by entering the URL directly into the browser, using a bookmark or the landing page appmark, and so forth). If the user is not already authenticated to the CloudAccess appliance, the browser is redirected to the CloudAccess login page and the user is prompted for login credentials. After a successful authentication or if the user is already authenticated to the appliance and is authorized to access the protected resource, the user gains access to the resource.