OpenID Connect Token Validation
The OpenID Connect Token Validation configuration category includes the following configurable options:
OIDC HTTP Client: JWKS Cache Timeout (mins)
OIDC HTTP Client: Truststore File
OIDC HTTP Client: Truststore Password
|
OIDC HTTP Client: JWKS Cache Timeout (mins) |
|
|
NON_NEGATIVE_INTEGER | |
If set to a non-zero value, any keystore lookups performed by the OIDC HTTP Client will be cached for the specified number of minutes. Caching these fetched keystores improves authentication performance by avoiding unnecessary lookups, but can also mean that invalidated keys will be honored for a period. Setting this to a small setting (such as the default value) is generally a sensible compromise. | |
|
|
30
|
|
|
|
OIDC HTTP Client: Truststore File |
|
|
Resource Path | |
Specifies a TrustStore to use for outbound client connections from the OIDC server. This is only needed in cases where the remote OIDC server uses a self-signed certificate for TLS. This truststore applies to outbound (from Smile CDR) HTTPS connections that are made in order to fetch the remote IDP server discovery document, to fetch the remote IDP server JWKS (keystore), and to introspect tokens issued by the remote IDP server. | |
|
|
(no default) | |
|
|
OIDC HTTP Client: Truststore Password |
|
|
PASSWORD | |
The password to use to open the truststore, if specified. | |
|
|
(no default) | |
|