Authorization Sources allow utilizing third party Oauth2 identity management systems (such as: Okta, GitLab, Azure AD, Google) for user authentication in VergeIO.
While Oauth2 is a standard specification, different implementations will vary. This page provides generalized instructions for configuring a third-party Oauth Source to be used for VergeIO authentication; specific fields and settings will differ depending on the selected driver (Google, Azure, OpenID, GitLab, etc.). Consult specific Oauth source documentation for information on particular options.
- Obtain Client ID and Client Secret from the third-party system; these credentials must be created based on the URL of the VergeIO system. These values willl be needed in a later step.
- From the VergeIO Main Dashboard, click System on the left menu.
- Click Auth Sources on the left menu.
- Click New on the left menu.
- Name: a name to identify this authorization source; this name will appear on the sign on button on the VergeIO login page.
- Driver: (dropdown list)
- Azure AD
- GitLab
- Google
- Okta
- Open ID *
- Open ID (Well-Known Config)
Verge.io
(This can be used to allow streamlined access for support; contact the VergeIO Support team for configuring this type of auth source.)
*The OpenID setting provides a generic option that could work for any OpenID source, while specific options, such as: Google, GitLab, Okta, and Azure AD provide wrappers with configuration forms that are more specialized for that particular implementation.
- Redirect URI: automatically populated with the address of the VergeIO UI and normally shouldn't be changed. This address must be a public address or otherwise accessible by the remote Oauth source.
- Client ID and Client Secret: values generated on the remote Oauth source, based on the URL of the VergeIO system.
- Remote User Fields: defines one or more fields that can be used for locating users in the Oauth source. The field is auto-populated with a default list of common fields (sub,preferred_username,email,nickname) that work across various common Oauth implementations
For security reasons, it is Not recommended to locate remote users based on fields that are changeable by end user on the Oauth sources.
-
- Update Remote User: updates the Remote Username field ,of the VergeIO user, to the unique ID from the Oauth Source. Enabling this option allows for initially locating the user based on more friendly fields (defined in Remote User Fields, above) but subsequently changing the VergeIO Remote Username field to match a unique id from the Oauth Source system. This ensures the user record remains constant even as extraneous fields such as email address or friendly username may change over time.
- Update User Email Address: updates Email address field based on email address from the Oauth source.
- Update User Display Name: updates user display name based on display name from the Oauth source.
-
- Scope: varies with different implementations; consult source Oauth2 documentation for more information. In most cases the default "openid profile email" will work.
- Group Scope: varies with different implementations; consult source Oauth2 documentation for more information. In most cases, the Group Scope can be set to the word "groups". Note: Group Scope is required when using the Update Group Membership option.
- Require Verified Email Address: (for Oauth2 implementations that support verifying user email address) only allow authentication of users with the verified email address flag enabled/true in the Oauth2 source.
- Update Group Membership: update user's group membership (each time user logs in) to correspond with group membership from the Oauth source
-
- Auto-Create Users: users are created automatically (on-demand, upon initial VergeIO login) corresponding to users in the Oauth source. Use ".*" without the quotes to apply to all users.
- Auto-Create Users in Group: only users within specified Oauth2 source groups are created automatically, on-demand, upon initial login. A specific group name can be entered or a regular expression to include group(s) with matching pattern.
In order to auto-create users based on group(s), the Auto-Create Users field should be blank.
Users that will use an external Authorization Source can optionally be created manually in VergeIO; when creating the new VergeIO user:
Select appropriate Authorization Source (dropdown list).
Set Remote Username to match one of the fields defined in Remote User Fields (fields that are used to find the user in the external authorization source); typically it is best to use the user's login name or unique user ID.
-
Login styling defines the appearance of the sign-in button on the VergeIO login page.
- Sign-in Button Background Color: background color for the sign-in button.
- Sign-in Button Text Color: text color of the sign-in button.
- Sign-in Button Font Awesome Icon: specifies an alternate icon for the sign-in button; https://fontawesome.com/v4.7.0/cheatsheet/ contains a listing of available Font Awesome Icons.
- Sign-in Button Font Awesome Icon Color: specifies an alternate color for the sign-in button; use standard HEX code, ex: #FF5733.
-
Debug Mode: (checkbox) turns on verbose logging for this authorization source; this should only be enabled when troubleshooting because large amounts of authentication logging can potentially impact performance.
-
Show In A Menu: (checkbox) changes the display to show a drop down menu instead of a list.
Need more Help? Email support@verge.io or call us at (855) 855-8300