Integrate with Curity
This short guide provides details on how to configure Beyond Identity as an Identity Provider in the Curity Identity Server.
Prerequisites​
- An installation of the Curity Identity Server. A good starting point is to follow the Getting Started Guide.
Create a Tenant​
Navigate here to Create a Tenant.
Once your tenant has been created with Beyond Identity, you can continue to create an Application.
Configuration​
Beyond Identity​
Outside of the prerequisites the only configuration that is needed on the Beyond Identity side is to make sure that an appropriate redirect_uri
is configured in the OIDC client that is going to be used. Example: https://idsvr.example.com/authn/authentication/beyond/callback
.
https://idsvr.example.com
is the baseURL configured in the Curity Identity Server/authn/authentication
is the default authentication endpoint/beyond
is the ID of the OpenID Authenticator configured in the Curity Identity Server/callback
is indicating that this is the callback where the Beyond Identity Platform Authenticator should redirect back to when user authentication is completed
The Curity Identity Server​
If the Getting Started Guide is followed an OAuth client should have been configured. A new Authenticator needs to be configured.
- Navigate to
Profiles
->Authentication Service
->Authenticators
-> ChooseNew Authenticator
- Give it a name (
beyond
in this documentation) and chooseOIDC
as the type, click Next - Add the Configuration URL -
https://auth-us.beyondidentity.com/v1/tenants/${tenant_id}/realms/${realm_id}/applications/${application_id}/.well-known/openid-configuration
- Add the
Client ID
obtained from the Beyond Identity Admin UI - Add the
Client Secret
obtained from the Beyond Identity Admin UI - Set
Client Authentication Method
to client-secret - Enable
Use HTTP Basic Authentication
Test using OAuth.tools​
Assign the new authenticator to an OAuth client that has the Code Flow enabled in the Curity Identity Server.
Using that client in OAuth.tools , initiate a Code Flow. If multiple authenticators are configured for the client select the previously created OIDC Authenticator (beyond).
The flow should automatically trigger the Beyond Identity Platform Authenticator, authenticate the user and then direct back to OAuth.tools. If Auto-redeem code
is enabled an Access Token, Refresh Token and optionally an ID Token should be issued.