SSO With OIDC

OpenID Connect performs many of the same tasks as OpenID 2.0 but does so in a way that is API-friendly and usable by native and mobile applications. OpenID Connect defines optional mechanisms for robust signing and encryption. Whereas integration of OAuth 1.0a and OpenID 2.0 required an extension, in OpenID Connect, OAuth 2.0 capabilities are integrated with the protocol.

OpenID Connect tends to be significantly easier to set up. Recorded Future uses a unique string referred to as an SSO_Key. This key is specific to each organization’s configuration. The SSO_Key will be provided during the initial setup by Recorded Future and must be replaced in certain fields as indicated below:

Configuration Information

Recorded Future uses We use the Grant Type of Authorization Code. The login redirect URI for Recorded Future is https://id.recordedfuture.com/login/callback

The following information is required by Recorded Future to set up an OIDC configuration in the platform:

  • IdP (identity provider) and/or authentication provider
    (e.g., Okta, Ping, Azure, ADSF, Duo, Google, RSA )
  • The metadata URL to the OIDC Discovery documents (commonly ending with .well-known/openid-configuration)
  • Client ID
  • Client Secret

The login redirect URI for Recorded Future is: https://id.recordedfuture.com/login/callbackWe use the Grant Type of Authorization Code. 

Additional Information:

Single Sign-on with Recorded Future

SSO With SAML

Single Sign-On Login Procedure

 

This content is confidential. Do not distribute or download content in a manner that violates your Recorded Future license agreement. Sharing this content outside of licensed Recorded Future users constitutes a breach of the terms and/or agreement and shall be considered a breach by your organization.
Was this article helpful?
0 out of 0 found this helpful

Articles in this section