3.2 KiB
UniFi Identity Enterprise (UID)
1. UID Application Configuration
Step 1: Log in to your Identity Enterprise Workspace
- Access the UID workspace (e.g.,
https://your-site.ui.com). - Log in with your credentials.
Step 2: Navigate to the Manager portal and create a new application
-
Select the
Manager Portal. You will be prompted to verify with MFA. -
Once signed in select
SSO Appsin the left-hand menu. -
Press the Plus button in the top right-hand corner.
-
Select
Add Custom App -
Select
OIDCfrom the menu -
Fill in the details for your application. The crucial fields needed are
Initiate Sign-In URIandSign-In Redirect URI.Initiate Sign-In URI - (e.g.,
https://voucher.example.com) Sign-In Redirect URI - (e.g.,https://voucher.example.com/callback) -
Press Add. You will now be presented with your Tool Collection for the app. Copy your
Client ID,Client Secretand the value form yourWell Known Config Endpoint. -
Press Done. You can now assign users or groups to the application. The setup has been completed UID side.
Step 3: Create or update your application configuration
Attention!: UID currently only supports the
confidentialClient Type.
- Copy the values from your
Well Known Config Endpoint,Client IDandClient Secretinto your application configuration. Then set theAUTH_OIDC_CLIENT_TYPEtoconfidential.
docker-compose.yml
AUTH_OIDC_ISSUER_BASE_URL: 'https://your-site.ui.com/gw/idp/api/v1/public/oauth/your-secret-token/.well-known/openid-configuration'
AUTH_OIDC_APP_BASE_URL: 'voucher.example.com'
AUTH_OIDC_CLIENT_ID: 'atlafa3i2j5ebhna5ds3hsxpx'
AUTH_OIDC_CLIENT_TYPE: 'confidential'
AUTH_OIDC_CLIENT_SECRET: 'vcusek6ixxjgxvvo57dqohxcjtjlqfutldvtbgycmpqltzt7zo'
- Build your application or update it.
sudo docker-compose up -d
sudo docker-compose up -d --force-recreate
Testing OIDC Sign-In
From UID Workspace
Navigate to the Applications section and select your application. This will launch the application. If you followed the steps correctly you should be able to access the voucher site without needing to authenticate.
External Sign In form outside of UID
Notice: You will only be prompted for UID sign-in if you have not signed in within your predefined sign in policy in UID.
Access your application via the Initiate Sign-In URI this will prompt a new window to sign in to UID. Once you sign in you will be redirected back to your application.
That's it you now have OIDC setup and can sign in to your application!










