Step 1: Create an IdP Entity
To establish a trust relationship between an enterprise IdP and Huawei Cloud, set the user redirect URLs and create OAuth 2.0 credentials in the enterprise IdP. On the IAM console, create an IdP entity and configure authorization information.
Prerequisites
- The enterprise administrator has created an account in Huawei Cloud, and has created user groups and assigned them permissions in IAM. For details, see Creating a User Group and Assigning Permissions. The user groups created in IAM will be mapped to federated users so that the federated users can obtain the permissions of the user groups to use Huawei Cloud resources.
- The enterprise administrator has read the help documentation of the enterprise IdP or has understood how to use the enterprise IdP. Configurations of different enterprise IdPs differ greatly, so they are not described in this document. For details about how to obtain an enterprise IdP's OAuth 2.0 credentials, see the IdP help documentation.
Creating OAuth 2.0 Credentials in the Enterprise IdP
- Set redirect URIs https://auth.huaweicloud.com/authui/oidc/redirect and https://auth.huaweicloud.com/authui/oidc/post in the enterprise IdP so that users can be redirected to the OpenID Connect IdP in Huawei Cloud.
- Obtain OAuth 2.0 credentials of the enterprise IdP.
Creating an IdP Entity on Huawei Cloud
Create an IdP entity and configure authorization information in IAM to establish a trust relationship between the enterprise IdP and IAM.
- Log in to the IAM console, choose Identity Providers from the navigation pane, and click Create Identity Provider in the upper right corner.
Figure 1 Creating an IdP entity
- Enter an IdP name, select OpenID Connect and Enabled, and click OK.
Figure 2 Setting IdP parameters
The IdP name must be unique under your account. You are advised to use the domain name.
Configuring Authorization Information in Huawei Cloud
- Click Modify in the Operation column of the row containing the IdP you want to modify.
Figure 3 Modifying an IdP
- Select an access type.
Figure 4 Access type
- Specify the configuration information.
Table 2 Configuration information Parameter
Description
Identity Provider URL
URL of the OpenID Connect IdP.
Set it to the value of issuer in the Openid-configuration.
NOTE:Openid-configuration indicates a URL defined in OpenID Connect, containing configurations of an enterprise IdP. The URL format is https://{base URL}/.well-known/openid-configuration, where base URL is defined by the enterprise IdP. For example, the Openid-configuration of Google is https://accounts.google.com/.well-known/openid-configuration.
Client ID
ID of a client registered with the OpenID Connect IdP. The client ID is an OAuth 2.0 credential created in the enterprise IdP.
Authorization Endpoint
Authorization endpoint of the OpenID Connect IdP. Set it to the value of authorization_endpoint in Openid-configuration.
This parameter is required only if you set Access Type to Programmatic access and management console access.
Scopes
Scopes of authorization requests. openid is selected by default.
This parameter is required only if you set Access Type to Programmatic access and management console access.
Enumerated values:
- openid
- profile
Response Type
Response type of authorization requests. The default value is id_token.
This parameter is required only if you set Access Type to Programmatic access and management console access.
Response Mode
Response mode of authorization requests. The options include form_post and fragment. form_post is recommended.
- form_post: If this mode is selected, set the redirect URL to https://auth.huaweicloud.com/authui/oidc/post in the enterprise IdP.
- fragment: If this mode is selected, set the redirect URL to https://auth.huaweicloud.com/authui/oidc/redirect in the enterprise IdP.
This parameter is required only if you set Access Type to Programmatic access and management console access.
Signing Key
Public key used to sign the ID token of the OpenID Connect IdP. For account security purposes, change the signing key periodically.
- Click OK.
Verifying the Federated Login
- Click the login link displayed on the IdP details page and check if the login page of the enterprise IdP server is displayed.
- On the Identity Providers page, click Modify in the Operation column of the identity provider.
- Copy the login link displayed on the Modify Identity Provider page and visit the link using a browser.
Figure 5 Copying the login link
- If the enterprise IdP login page is not displayed, check the configurations of the IdP and the enterprise IdP server.
- Enter the username and password of a user that was created in the enterprise management system.
- If the login is successful, add the login link to the enterprise management system.
- If the login fails, check the username and password.
Federated users can only access Huawei Cloud by default. To assign permissions to federated users, configure identity conversion rules for the IdP. For details, see Step 2: Configure Identity Conversion Rules.
Related Operations
- Viewing IdP information: In the IdP list, click View in the row containing the IdP, and view its basic information, metadata, and identity conversion rules.
To modify the configuration of an IdP, click Modify at the bottom of the details page.
- Modifying an IdP: In the IdP list, click Modify in the row containing the IdP, and then change its status or modify the description, metadata, or identity conversion rules.
- Deleting an IdP: In the IdP list, click Delete in the row containing the IdP, and click OK in the displayed dialog box.
Follow-Up Procedure
- Configure identity conversion rules to map enterprise IdP users to IAM user groups and assign permissions to the users. For details, see Step 2: Configure Identity Conversion Rules.
- Configure the enterprise management system to allow users to access Huawei Cloud through SSO. For details, see (Optional) Step 3: Configure Login Link in the Enterprise Management System.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot