Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 10 Current »

Applies to: (tick) Kyvos Enterprise  (tick) Kyvos Cloud (SaaS on AWS) (tick) Kyvos AWS Marketplace

(tick) Kyvos Azure Marketplace   (tick) Kyvos GCP Marketplace (tick) Kyvos Single Node Installation (Kyvos SNI)


OpenID Connect (OIDC) is a federated SSO authentication protocol built over OAuth2.0 and is already supported for authentication in the Kyvos Web Client.

Note

  • From Kyvos 2024.1 onwards, a restart of the Kyvos Web Portal will not be required for Kyvos security configuration (Web based SSO).

  • To access Excelerate Web and Desktop through OIDC, you must configure confidential and public OIDC.

  • To access Tableau Server and Desktop through OIDC, you must configure confidential and public OIDC.

Kyvos supports OIDC authentication (Browser-based login/SSO ) for Excelerate desktop and web version.

Configuration Type

Kyvos Web Portal

Excelerate Desktop

Excelerate Web

Tableau Desktop

Tableau Server

Confidential OIDC

(tick)

(error)

(tick)

(error)

(tick)

Public OIDC

(tick)

(tick)

(error)

(tick)

(error)

To configure the OIDC (Auth2.0) as an external authentication provider for the Kyvos Web Portal, perform the following steps. 

  1. On the navigation pane, click Security > Web based SSO.
    The Web based SSO dialog is displayed. 

  2. Select the Enable External Authentication check box to define the external authentication mechanism for the Kyvos Web portal.

  3. Select the OIDC option from the Provider list.

  4. Enter details as:

Parameter/Field

Comments/Description

Header Name

Enter the name of the HTTP header that contains the user name in the HTTP request.

Header Type

Select the type of value to be sent by the external authentication tool as an SSO token.

Error Redirection URL

Enter the URL to which the user will be redirected if there is an error in authenticating the Kyvos application with OIDC
Absolute URLs are supported. 
For example: http://host:port/appname

  1. For OIDS Settings for Confidential Client and Public client, enter details as:

  1. Click the Save button to save changes.

  • No labels