NGINIX/OIDC Reverse-proxy Configuration
Requirements
NGINIX Plus (NGINX Plus)
SurePassID Identity Provider
Install
Follow the nginx-openid-connect installation instructions.
NGINX (nginx-openid-connect) - Installation
Install the jq
command-line JSON processor. There is a dependency for this but it is not automatically installed.
sudo yum install jq
SELinux Issue Workaround
There is an issue with NGINIX’s permissions for the directory “/etc/nginx/conf.d
". The simplest workaround for this is to change the owner and group of that directory to "nginix
".
sudo chown ngnix:ngnix /etc/nginx/conf.d
A better solution would be to fix SELinux httpd_t
context to allow the nginix process to create files in that directory.
Using NGINX and NGINX Plus with SELinux
Configuring the SurePassID Identity Provider
NGINX (nginx-openid-connect) - Configuring your IdP
NGINX OpenID Connect Client Configuration
Use the following SurePassID Identity Provider OpenID Connect client configuration for the NGNIX replying party.
Update the following properties as required.
ClientId
ClientName
ClientSecrets.Value
RedirectUris
PostLogoutRedirectUris
Properties.*
See Client Object Reference for more details.
Configuring NGINIX Plus
NGINX (nginx-openid-connect) - Configuring NGINX Plus
Run the configure.sh
script using the SurePassID OpenID Connect Discovery URL.
./configure.sh https://oidc.surepassid.com/.well-known/openid-configuration
Make the following changes to the openid_connect_configuration.conf
file.
Added the following end session endpoint mapping.
map $host $oidc_endsession_endpoint { default https://oidc.surepassid.com/connect/endsession; }
Add the following to the file so that the JWKS URL can be used to automatically keep the keys up-to-date.
map $host $oidc_jwks_uri { default https://oidc.surepassid.com/.well-known/openid-configuration/jwks; }
Set the Client ID and Client Secret in the mappings as shown.
Modify the
$oidc_logout_redirect
to use the URI "/oidc_logout
". This will be configured in the next section
This is a complete example of the updated openid_connect_configuration.conf
file.
Make the following changes to the frontend.conf
file. This is where the backend application server is configured.
Configure the upstream (backend) servers.
upstream directiveIf applicable, configure SSL.
http://nginx.org/en/docs/http/ngx_http_ssl_module.htmlAdd the
/oidc_logout
location. Place this in theserver
block before the/
location.Configure the reverse proxy to the backend application server.
Â
This is a complete example of the updated frontend.conf
file.