OpenID-Connect-Java-Spring-.../account-chooser
Justin Richer e00bba7ede factored out one more piece of the security config 2012-05-11 13:43:29 -04:00
..
.settings Updated classes to track newest version of SECOAUTH. This update closes issues #3, #4, #8, and #36 (infinite redirects). This revision changes the authorization and token endpoints to be /openidconnect/auth and /openidconnect/token, respectively. 2012-05-09 15:16:56 -04:00
src/main issue #39 2012-05-08 19:52:13 -04:00
.classpath factored out one more piece of the security config 2012-05-11 13:43:29 -04:00
.gitignore added .gitignore 2012-05-09 09:42:42 -04:00
.project issue #39 2012-05-08 19:52:13 -04:00
README.md readme tweaks. 2012-05-08 20:04:51 -04:00
pom.xml issue #39 2012-05-08 19:52:13 -04:00

README.md

Account Choooser UI Application

Overview

This is Web application created in response to Issue #39 to permit the Client AuthenticationFilter to speak to multiple OpenID Connect servers.

Configuration

Configure a bean configuration to the spring-servlet.xml like so:

<bean class="org.mitre.account_chooser.OIDCServers">
	<property name="servers">
		<map>
			<entry key="1">
				<bean class="org.mitre.account_chooser.OIDCServer">
					<property name="name" value="OIDC Server 1" />
				</bean>
			</entry>
			<entry key="2">
				<bean class="org.mitre.account_chooser.OIDCServer">
					<property name="name" value="OIDC Server 2" />
				</bean>
			</entry>
			<entry key="3">
				<bean class="org.mitre.account_chooser.OIDCServer">
					<property name="name" value="OIDC Server 3" />
				</bean>
			</entry>
		</map>
	</property>
</bean>

The keys must match those found in the OpenIdConnectAuthenticationFilter's configuration like so:

<bean id="openIdConnectAuthenticationFilter"
	class="org.mitre.openid.connect.client.OpenIdConnectAuthenticationFilter">
	<property name="OIDCServers">
		<map>
			<entry key="1">
				<property name="authorizationEndpointURI" 
					value="http://sever.example.com:8080/openid-connect-server/oauth/authorize" />
				<property name="tokenEndpointURI" 
					value="http://sever.example.com:8080/openid-connect-server/oauth/token" />
				<property name="checkIDEndpointURI" 
					value="http://sever.example.com:8080/openid-connect-server/checkid" />
				<property name="clientId" 
					value="someClientId" /> 
				<property name="clientSecret" value="someClientSecret" />
			</entry>
			…