配置外部身份提供者
To configure Workforce Identity Federation with OIDC, register your OIDC application with an external identity provider, such as Okta or Microsoft Entra ID. This ensures secure authentication and facilitates user management.
关于此任务
Workforce Identity Federation uses OIDC. You can use any external identity provider that supports the OIDC standard.
You can configure your OIDC application for the following grant types:
Authorization Code Flow with PKCE
Device Authorization Flow
MongoDB recommends that you use Authorization Code Flow with PKCE for increased security. Use Device Authorization Flow only if your users need to access the database from machines with no browser.
注意
Workforce Identity Federation supports only JWT for authentication. It doesn't support opaque access tokens.
The following procedures provide detailed configuration instructions for Microsoft Entra ID and Okta, and generic configuration instructions for other external identity providers.
开始之前
To use Okta as an identity provider, you must have an Okta account.
To use Microsoft Entra ID as an identity provider, you must have a Microsoft Azure account.
步骤
注册应用程序
导航至 App registrations。
In your Azure portal account, search and click Microsoft Entra ID.
在左侧导航栏的 Manage 部分,单击 App registrations。
单击 New registration(连接)。
应用以下值。
字段值Name
MongoDB - Workforce
Supported Account Types
Accounts in this organizational directory only (single tenant)
Redirect URI
- Public client/native (mobile & desktop)- To access clusters using MongoDB Compass and MongoDB Shell, set the Redirect URI tohttp://localhost:27097/redirect
.单击 Register(连接)。
To learn more about registering an application, see Azure Documentation.
Add a group claim
导航至 Token Configuration。
在左侧导航栏的 Manage 部分,单击 Token Configuration。
单击 Add groups claim(连接)。
在 Edit groups claim 模式中,选择 Security。
所选择的群组取决于您在 Azure 环境中配置的群组类型。 您可能需要选择不同类型的群组 来发送相应的群组信息。
In the Customize token properties by type section, only select Group ID.
单击 Add(连接)。
To learn more about adding a group claim, see Azure Documentation.
Add a user identifier claim to the access token
单击 Add optional claim(连接)。
在 Add optional claim 模式中,选择 Access。
Select a claim that carries a user identifier that you can refer to in MongoDB access logs such as an email.
You can use the UPN claim to identify users with their email address.
单击 Add(连接)。
In the Microsoft Graph Permissions note, check the box, and click Add.
To learn more, see Azure Documentation.
更新清单
在左侧导航栏的 Manage 部分,单击 Manifest。
将 accessTokenAcceptedVersion 从
null
更新为2
。The number
2
represents Version 2 of Microsoft's access tokens. Other applications can use this as a signed attestation of the Active Directory-managed user's identity. Version 2 ensures that the token is a JSON Web Token that MongoDB understands.单击 Save(连接)。
To learn more about adding an optional claim, see Azure Documentation.
记住元数据
在左侧导航栏中单击 Overview。
Copy the Application (client) ID value.
在顶部导航栏中,单击 Endpoints。
Copy the OpenID Connect metadata document value without the
/.well-known/openid-configuration
part.You can also get this value by copying the value for
issuer
in the OpenID Connect metadata document URL.
The following table shows what these Microsoft Entra ID UI
values map to in the MongoDB oidcIdentityProviders
parameter:
Microsoft Entra ID UI | MongoDB oidcIdentityProviders 参数字段 |
---|---|
Application (client) ID | clientID audience |
OpenID Connect metadata document (without /.well-known/openid-configuration) |
|
Create an application in Okta
In your Okta Admin dashboard, use the left navigation pane to go to Applications → Applications.
On the Applications screen, click Create App Integration.
In the Sign-in method section, select OIDC - OpenID Connect.
In the Application type section, select Native Application.
单击 Next(连接)。
To learn more, see Create OIDC app Integrations.
Configure your New Native App Integration
After you create an app integration, you are automatically redirected to the New Native App Integration screen.
In the App integration name field, enter a name for your application.
In the Grant type field, select grant types.
Enable the following grant types:
Authorization Code 或 Device Authorization
(Optional) Refresh Token
Enabling refresh tokens provides a better user experience. When refresh tokens are not enabled, users must re-authenticate with the identity provider once their access token expires.
In the Sign-in redirect URIs section, enter a URL.
Enter the following URL:
http://localhost:27097/redirect
.In the Assignments section, configure the Controlled access and Enable immediate access fields.
For the Controlled access field, select Allow everyone in your organization to access.
For Enable immediate access field, ensure Enable immediate access with Federation Broker Mode is checked.
单击 Save(连接)。
To learn more, see Create OIDC app integrations.
Configure PKCE and obtain client ID
On your application dashboard, go to the General tab and configure the following:
In the Client ID field, click the icon to copy the client ID for later use.
In the Proof Key for Code Exchange (PKCE) field, ensure Require PKCE as additional verification is enabled (checked by default).
Add an authorization server
In the left navigation pane, go to Security → API. Click Add Authorization Server.
In the Name field, enter a name for your server.
In the Audience field, paste the client ID from the previous step.
(Optional) In the Description field, enter a description of your server.
单击 Save(连接)。
To learn more, see Create an Authorization Server.
Find and save the issuer URI
After you create your authorization server, you are automatically redirected to your authorization server's screen.
Under the Settings tab, save the issuer URI by copying the
first part of the Metadata URI up to the .well-known
section. The URI structure should be similar to:
https://trial4238026.okta.com/oauth2/ausabgmhveoOQSMsE697
.
Add Groups claim
On your authorization server screen, go to the Claims tab and click Add Claim.
配置 Groups claim with the following configuration information:
字段值Name
Enter a name for your claim.
Include in token type
Click the drop-down and select Access Token.
Value type
Click the drop-down and select Groups.
Filter
Click the drop-down and select Matches regex. Next to the drop-down, enter
.*
.Disable claim
Do not check.
Include in
选择 Any scope 。
单击 Create(连接)。
To learn more, see Create Claims.
Create an access policy
On your authorization server screen, go to the Access Policies tab and click Add Policy.
In the Name field, enter a policy name.
In the Description field, enter a description for the policy.
In the Assign to field, select All clients.
单击 Create Policy(连接)。
To learn more, see Create an Access Policy.
Create a rule for the access policy
Under the Access Policies tab, click Add Rule.
In the Rule Name field, enter a name for the access policy.
For IF Grant Type is, select a grant type.
When configuring grant types, select the appropriate option based on the client behavior:
If the client is acting on behalf of itself, select Client Credentials.
If the client is acting on behalf of a user, select the following:
Authorization Code
Device Authorization
Add rule configurations based on your organization's security policy.
Example Okta rule configuration:
字段
值
AND user is
选择 Any user assigned to the app 。
AND Scopes requested
选择 Any scopes 。
THEN Use this inline hook
None (disabled)
AND Access token lifetime is
1 Hours
AND Refresh token lifetime is
Click the second drop-down and select Unlimited.
but will expire if not used every
Enter 7 days.
单击 Create Rule(连接)。
To learn more, see Create Rules for each Access Policy.
Create a group
In the left navigation pane, go to Directory → Groups and click Add Group.
In the Name field, name your directory
OIDC
.(Optional) In the Description field, enter a description for your rule.
单击 Save(连接)。
To learn more, see Create a Group.
Add a user to your organization
In the left navigation pane, go to Directory → People and click Add Person.
Provide user details by entering the following values in the corresponding fields:
字段值User type
选择 User 。
First name
Provide name as needed.
Last name
Provide name as needed.
Username
Enter an email as a username.
Primary email
Enter an email. The email must be same as the one used for the Username field.
Secondary email
可选。
Groups
Enter OIDC.
Activation
选择 Activate Now and check I will set password.
Password
Enter a password.
User must change password on first login
选择 Optional
单击 Save(连接)。
To learn more, see Add Users Manually.
(Optional) Allow refresh tokens if you want MongoDB clients to refresh the tokens for a better user experience
(Optional) Configure the access token lifetime (exp
claim) to align with
your database connection session time
After you register your application, save the issuer
,
clientId
, and audience
values to use in the next stage of the
configuration.