Configure OAuth Settings for Client App
In client application’s OAuth you can configure OAuth-related settings like available grant types, response types, and more.
To configure application’s OAuth settings:
-
Navigate to Applications > Clients.
-
Select client application.
-
Go to the OAuth tab.
Skip User Consent
To skip gathering consents from users to share their data, enable the TRUSTED checkbox in Application Properties.
Configure Grant Types and Response Types
-
Navigate to your client applications OAuth tab.
-
Select Grant Types and Response Types from the dropdown menus.
-
Grant Types define the OAuth 2.0 flows this application can follow to obtain an access token from Cloudentity.
-
Response Types define how the Cloudentity is allowed to respond to authorization requests made by this application.
Note that different grant types require different responses. Cloudentity supports all OAuth 2.0 grant types - you can read more about each flow in Authorization basics.
-
-
Save changes.
Configure Client Authentication for Client App
-
Navigate to your client applications OAuth tab.
-
Under Client Authentication, specify the signing method for the Request Object. Note that signed authorization requests are required to meet certain security standards, such as Financial-grade API.
When this option is selected and not set to None, Cloudentity will reject unsigned authorization requests.
-
Select Token Endpoint Authentication Method for the client to use.
Configure Available Client Authentication Methods
Available client authentication methods depend on the authorization server configuration.
Go to Auth Settings > OAuth > Client Authentication to configure allowed client authentication methods for this workspace.
-
If using mTLS client authentication, either enable the JSON Web Key Set option and provide applications JWKS or enable the JWKS URI and provide a link to it.
-
Save changes.
Configure Advanced OAuth Settings for Client Apps
-
Navigate to your client applications OAuth tab.
-
Select the Subject Type toggle switch to use pairwise subject identifiers (request URL to share user data and place them in the same sector). Additionally, you can add the Sector Identifier URI which points to a JSON file containing an array of Redirect URI values.
-
Under Authorization Response (JARM), you can configure the encoding of the JWT-encrypted response, which is sent by Cloudentity when a JWT response mode is required by the client.
-
Signing algorithm is the algorithm type used for signing the authorization response. The value depends on authorization server signing key algorithm.
-
Encryption algorithm is the encryption algorithm type used for signing the authorization response. If set, the corresponding public key must be configured in either JWKs or JWKs URI. JWT encryption is optional.
-
-
Configure Sender Constrained Tokens.
Sender Constrained Tokens are a security feature that allows a resource server to verify that a request is being made by an authorized sender.
-
Configure ID token encryption.
The authorization server can issue encrypted ID tokens to client application. To get encrypted ID tokens, set the Encryption and Content Encryption algorithms and configure encryption public key in JSON Web Key Set or JSON Web Key set URI.
-
Configure Authorization Response (JARM).
When JWT Authorization Response Mode (JARM) is used, the Cloudentity platform responds to clients' requests with a signed JSON Web Token for improved security.
-
Enforce Pushed Authorization Requests (PAR).
-
Save changes.