Skip to main content
Skip table of contents

Settings: auth

The following settings are used to configure the authentication of users. As standard, the authentication mechanism of the servlet container or application server is used. Alternatively, Single Sign On (SSO) with OpenID Connect (OIDC) can be used.

  • Mobile apps for Android and iOS are not compatible with Single Sign On. Use the setting auth.type = REALM to use signoSign/Universal via the apps.

  • The setting of the key web.ssmPublicUrl is essential for the use of single sign-on.

auth.type

Description

Specifies the type of authentication.

To use OpenID Connect, the keys auth.oidc.discoveryUrl, auth.oidc.clientId, and auth.oidc.clientSecret must be specified.

Possible values

REALM

The authentication mechanism of the servlet container or application servers is used.

OIDC

Users are authenticated by an authorization server by means of OpenID Connect.

Default value

REALM

auth.realm.forceLowerCaseUsername

Description

If this setting is activated, the user name is case-insensitive. Users "John Smith" and "john smith" share the same data in the system, such as documents. Both users can log in, however, as long as the log-in mechanism allows this, but signoSign/Universal uses the lower case user name internally.

Possible values

true

The search is not case-sensitive. "John Smith" and "john smith" refer to the same user account.

false

The search is case-sensitive. "John Smith" and "john smith" refer to the different user accounts.

Default value

false

auth.oidc.discoveryUrl

Description

The URL of the OpenID provider metadata of the identity server. The URL generally ends with /.well-known/openid-configuration.

To use OpenID Connect, this value must be specified.

Possible values

A URL.

Default value

-

auth.oidc.clientId

Description

The identifier that signoSign/Universal is registered with for the identity server. An application that uses OpenID Connect must be registered with the identity server. This identifier will then be issued and it is needed for the authorization code flow.

To use OpenID Connect, this value must be specified.

Possible values

Any string of characters.

Default value

-

auth.oidc.clientSecret

Description

The secret specified with the identity server that signoSign/Universal uses for the authorization code flow.

To use OpenID Connect, this value must be specified.

Possible values

Any string of characters.

Default value

-

auth.oidc.scope

Description

The scope values that are used for the authorization code flow. For the fundamental functionality, OpenID Connect requires the value openid.

Possible values

Any string of characters.

Default value

openid profile email

auth.oidc.usernameClaim

Description

The value (claim) in the token from which the user name is taken. If the value is not present or is empty, it is not possible to log in to signoSign/Universal.

Possible values

Any string of characters.

Default value

email

The standard value email is a standard claim that is inserted into the token by the scope email. If the value email is not contained in auth.oidc.scope, this setting should be checked.

auth.oidc.rolesClaim

Description

The value (claim) in the token from which the user roles are taken. If the value is not present in the token, is empty or is not a JSON array, it is not possible to log in to signoSign/Universal.

Possible values

Any string of characters.

Default value

roles

The standard value roles is not a standard claim because OpenID Connect does not define a standard for user roles. The value must be inserted into the token by proprietary setting of the identity server and by using custom scopes.

auth.oidc.tokenAudience

Description

From the perspective of the identity server, signoSign/Universal is a resource. An OAuth access token is always issued for a resource. This setting can be used to specify a list of valid resources. The signoSign/Universal REST API will only accept the access token if its aud claim value is included in this list. The check is deactivated if no value has been specified.

Possible values

A comma-separated list of identifiers.

Default value

-

If the signoSign/Universal REST API is available publicly, specifying this list is strongly recommended for security reasons. The public REST API should always check whether an access token was issued for the API.

auth.oidc.tokenIssuer

Description

A list of additional trustworthy access token issuers. The issuer from the OpenID provider metadata is always trustworthy. The signoSign/Universal REST API will only accept access tokens if their iss claim value is known.

Possible values

A comma-separated list of identifiers.

Default value

The issuer from OpenID provider metadata, if available.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.