Technical Guide
Beginning in Launcher 3.x, the configurations for the authentication providers have been moved out of the settings
object into their own separate objects under the root configuration. If you are using Launcher 3.x, the following should be used when configuring the authentication providers:
LDAP
Field | Description |
---|---|
hostname | string Hostname of the LDAP server. |
port | integer Port of the LDAP server. |
domain | string The domain of the user when logging in (i.e. |
rootDN | string The Root DN of where the users can be searched after authentication (e.g. |
useHttps | boolean Set to true to use LDAPS when authenticating via HTTPS. |
Example:
Auth4 LDAP
Auth version 4 LDAP supports all original LDAP key-value pairs, and beginning in Auth version 4.7.14 additional attributes can be added to the base configuration.
Field | Description |
---|---|
auth_default_group | string If specified, Auth will always assign an authenticated user this string value as a session group upon login. |
generateToken | boolean If |
keyAlias | string If generating a token, this value is the provided 'name' when the certificate is created prior to importing into Auth. Only required if |
claimsMap | string If generating a token, specify a comma-delimited list of LDAP attributes to be added as claims inside the JWT token. Only required if |
Optional: LDAP Connections Array
Beginning in Auth - LDAP version 4.7.14, LDAP supports listing multiple LDAP domain/connection point objects, using the same key-values listed above, within an auth_ldap_connections
array. This will give several authentication options in case one service is unavailable. The authentication module will attempt each service until it successfully logs a user in with the provided credentials.
Auth4 LDAP Example (including optional auth_ldap_connections
):
Okta/OneLogin (PKCE flow)
Field | Description |
---|---|
issuer_uri | string The configured issuer URI for the identity provider. |
client_id | string The configured client ID for this application. |
redirect_uri | string The configured redirect callback URI for this application. |
scopes | string The scopes where this authentication applies. |
force_logout | string This allows for overriding the default logout End Session URL. This is required for OneLogin. |
The following fields will still need to be configured under the settings
object when using the Okta Auth Provider:
Field | Description |
---|---|
auth_location_field | string An optional setting that tells authorization which field in the auth provider response contains location information. Used in conjunction with |
auth_location_regex | string A regular expression to extract the location value from the location field. Used in conjunction with |
auth_group_field | string An optional setting that tells authorization which field in the authentication provider response contains group information. Used in conjunction with |
auth_group_regex | string A regular expression to match against the group information. Used in conjunction with |
auth_group_regex_true | string If the regular expression |
auth_default_group | string A default group. |
auth_role_field | string An optional setting that tells authorization which field in the authentication provider response contains user role information. Used in conjunction with |
auth_role_regex | string A regular expression to match against the role information. Used in conjunction with |
auth_role_regex_true | string If the regular expression |
auth_default_role | string A default user role. |
Example:
Beginning in Auth 4.x, Okta authentication will be configured with the auth_oauth2
object instead of the auth_okta
object, as in this example:
Please note the following changes: * the
issuer_uri
andredirect_uri
have been renamed toissuer_url
andredirect_url
. * new redirect URLs have been introduced for compatibility with other OIDC providers: *com.bluefletch.ems.auth://callback
*com.bluefletch.ems.auth://logout
For more information on the properties for configuring, see the AppAuth/OIDC IDP section.
Okta (Session)
Beginning in Auth 4.6.1, a REST session flow is supported for authentication through Okta using the auth_oauth2
object and the OKTAREST Auth binary.
Field | Description |
---|---|
issuer_url | string The configured Issuer URI for the identity provider. |
client_id | string The configured client ID for this application. |
redirect_url | string The configured redirect callback URL for this application. Use |
scopes | string The scopes where this authentication applies. |
redirect_url_verify | string Specifies the redirect URL used when refreshing cookies during the verification after reauthentication. Always set the value as |
mfaVerifyIntervalWait | integer Number of seconds to wait before reattempting multi-factor authentication in Okta Verify push. Default is |
mfaVerifyAttempts | integer Maximum number of attempts to correctly verify multi-factor authentication before account locks. Default is |
Example:
AppAuth/OIDC IdP
Beginning in Auth 4.x, the AppAuth/Generic OAuth2 configuration will support login through the BlueFletch Browser, as well as Chrome Custom Tabs. The authenticating browser is defined by the browser
value.
Field | Description |
---|---|
issuer_url | string The configured issuer URL for the identity provider. |
client_id | string The configured client ID for this application. |
redirect_url | string The configured redirect callback URL for this application. The recommended callback URL is |
redirect_url_verify | string Specifies the redirect URL used when refreshing cookies during the verification after reauthentication. Always set the value as |
scopes | string The OpenID scope values required for the identity provider. |
baseUrl | string Base URL for the identity provider. |
authorize_url | string The full URL for the |
token_url | string The full URL for the |
logout_url | string The full URL for the |
logout_redirect | string The full URL for the logout redirection location for your IdP. Default is |
userinfo_url | string The full URL of the |
resource | string Specifies the host to access for a token during login when the IdP does not provide it through |
alternateResource | string Specifies an additional resource for which the access token should be valid. By default, Azure generates an encrypted access token for use with Microsoft Graph. By specifying an alternate host, the token becomes a standard access token. (e.g. |
login_hint | string Hint to be displayed for the username field on the identity provider login page. |
ignoreExpiresIn | boolean If |
browser | string Specifies the browser package name to execute the |
refreshThresholdInMins | integer The number of minutes after which the launcher will automatically refresh the token if |
auth_location_field | string An optional setting that tells authorization which field in the auth provider response contains location information. Used in conjunction with |
auth_location_regex | string A regular expression to extract the location value from the location field. Used in conjunction with |
auth_group_field | string An optional setting that tells authorization which field in the authentication provider response contains group information. Used in conjunction with |
auth_group_regex | string A regular expression to match against the group information. Used in conjunction with |
auth_group_regex_true | string If the regular expression |
auth_default_group | string A default group. |
auth_role_field | string An optional setting that tells authorization which field in the authentication provider response contains user role information. Used in conjunction with |
auth_role_regex | string A regular expression to match against the role information. Used in conjunction with |
auth_role_regex_true | string If the regular expression |
auth_default_role | string A default user role. |
claim_userId | string The claim in the access token that contains the user ID of the logged-in user. |
claim_username | string The claim in the access token that contains the display name of the logged-in user. |
claim_groups | string The claim in the access token that contains the logged-in user's membership groups. |
userinfo_attrs | string A comma-delimited list of names indicating the field names within the |
Example:
OIDC-Azure
Beginning in Auth 4.3.x, the auth_oauth2
object can be applied to Azure AD authentication when using the OIDC-Azure Auth binary.
Example:
MSAL for Azure AD
BlueFletch continues to support the following configuration settings for the Auth version 3.x.x binaries of the MSAL module. See Auth4 MSAL below for configuration settings supported in Auth version 4.5.9 and above.
Field | Description |
---|---|
client_id | string The client ID used to register this application. |
authorization_user_agent | string Set to |
redirect_uri | string The configured redirect callback URI for this application. For the MSAL library, the redirect must use the application ID and its signature. Use |
broker_redirect_uri_registered | boolean Set to |
authority_type | string Set to |
authority_url | string The directory from which MSAL can request tokens. Typically, set to |
tenant_id | string Set to the Azure Tenant ID. Deprecated as of Auth version 4.5.9 (see Auth4 MSAL). |
logout_url | string Set to |
limit_to_launcher_groups | boolean If set to |
Auth3 Example:
Auth4 MSAL
Beginning in Auth version 4.5.9, some of the MSAL configuration settings change to more fully support new developments from Microsoft.
Field | Description |
---|---|
client_id | string The client ID used to register this application in Azure AD. |
authorization_user_agent | string Set to |
redirect_uri | string The configured redirect callback URI for this application. For the MSAL library, the redirect must use the application ID and its signature. Use |
authority_type | string Set to |
authority_url | string The directory from which MSAL can request tokens. Typically, set to |
logout_url | string Set to |
limit_to_launcher_groups | boolean If set to |
scopes | string OIDC scope values required for the identity provider. For MSAL, the values should be |
audience_tenant_id | string Set to the Azure Tenant ID. Replaces |
shared_device_mode_supported | boolean Set to |
broker_redirect_uri_registered | boolean If |
limit_groups_to_direct_membership | boolean If set to |
Auth4 Example:
For more information on configuring, see the AppAuth/OIDC IdP section.
ADFS 3.0/2012 Using ADAL library
Field | Description |
---|---|
authority | string Configured resource ID for this application. |
resourceId | string Configured resource ID for this application. |
clientId | string Configured client ID for this application. |
redirectUri | string Configured callback URL for this application |
defaultDomain | string Pre-populates the username field with the domain prefix (optional). |
claim_userId | string Passthrough field containing the userID (e.g. |
claim_username | string LDAP passthrough field containing the user's display name. |
claim_groups | string LDAP passthrough field containing the groups (e.g. equivalent to MemberOf). |
baseUrl | string The base URL for the ADFS environment. |
Example:
Okta (Resource Owner Flow)
Field | Description |
---|---|
issuer_uri | string The configured Issuer URI for the identity provider. |
client_id | string The configured client ID for this application. |
client_secret | string The configured client secret for this application. |
redirect_uri | string The configured redirect callback URI for this application. |
scopes | string The scopes where this authentication applies. |
Example:
Last updated