Using OpenID Connect Authentication
To configure the Web Author Administration page to use authentication from an OpenID Connect server:
- 
          Edit the shiro.ini file located in the following location depending on your type of distribution: - WAR distribution: WEB-INF/shiro.ini
- Windows/Linux/All Platforms: tomcat/webapps/oxygen-xml-web-author/WEB-INF/shiro.ini
 
- Disable the default user password authentication configuration by
          deleting the lines between "Start user-password admin auth config" and "End
            user-password admin auth
          config":# <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< # Start user-password admin auth config: usersFileRealm = ro.sync.adminauth.userpassword.UserPasswordAdminRealm passwordMatcher = org.apache.shiro.authc.credential.PasswordMatcher passwordService = ro.sync.adminauth.userpassword.PlainAndHashedPasswordService hashFormatFactory = ro.sync.adminauth.userpassword.PlainHashFormatFactory passwordService.hashFormatFactory = $hashFormatFactory passwordMatcher.passwordService = $passwordService usersFileRealm.credentialsMatcher = $passwordMatcher securityManager.realms = $usersFileRealm authc = ro.sync.adminauth.userpassword.UserPasswordFormAuthFilter authc.loginUrl = /admin-login # End user-password admin auth config. # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
- Uncomment the OIDC authentication configuration by deleting leading
          "#" characters like
          below:# <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< # Start OIDC admin auth config: # oidcApi=ro.sync.adminauth.oidc.OidcApi oidcApi.providerName=Okta oidcApi.clientId=[OIDC_CLIENT_ID] oidcApi.clientSecret=[OIDC_CLIENT_SECRET] oidcApi.authorizationEndpoint=[OIDC_AUTHORIZATION_ENDPOINT] oidcApi.tokenEndpoint=[OIDC_TOKEN_ENDPOINT] oidcApi.userInfoEndpoint=[OIDC_USER_INFO_ENDPOINT] # oidcRealm=ro.sync.adminauth.oidc.OidcAuthAdminRealm oidcRealm.oidcApi=$oidcApi # # For e.g: http://localhost:8081/oxygen-xml-web-author oidcRealm.webAuthorUrl=[WEB_AUTHOR_URL] # securityManager.realms = $oidcRealm # authc = ro.sync.adminauth.oidc.OidcAuthFilter # # End OIDC admin auth config. # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
- 
          Configure it according to the application defined in your OIDC server. 
Note: 
    The embedded license server does not support OIDC authentication.
      The admin user for that license server is the one configured during the installation
      procedure.
Notice: 
  When configuring the OIDC application, you have to set
      something like this as the callback URL:
        http://localhost:8081/oxygen-xml-web-author/admin-login/callback.
