SMART Server Definitions
OpenID Connect Server Definitions are used by the SMART Inbound Security module as the definition for an OIDC provider whose tokens may be trusted by the module.
They are also used by the SMART Outbound Security when running in Federated OAuth2 mode as the definition for an OIDC provider to federate with.
An OpenID Connect Server definition must be created in order to accept external access tokens. This definition describes the external Authorization Server and tells the SMART Inbound Security module that it is okay to trust the Authorization Server and the tokens it generates in order to authorize access to functions in Smile CDR.
To create an OpenID Connect Server definition:
The most important property when defining the server definition is the Issuer. This is a URL which points to the base URL of the OpenID Connect Authorization Server you wish to trust. Note that the value here must point to a valid OpenID Connect server, and this server must be network accessible by the SMART Inbound Security module. The issuer URL must also match the iss
(issuer) claim that is received as a part of any Access Tokens created by the Authorization Server.
Note that trailing slashes in the Issuer URL are ignored in order to avoid incompatibilities. If the Authorization Server iss
claim includes a trailing slash, this will not cause any issues.
If present, the validation key is specified in JWK/JWKS format. Any tokens accepted for this server will be verified against the given key, and authentication will fail if the token can not be verified.
If Smile CDR needs to authenticate itself with the OIDC server, the client authentication mode may be specified. The following mode options are available: