Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
The Custom OIDC connector usestype: oidc and supports standard OpenID Connect discovery, authorization code flow, and token validation. It works with any identity provider that publishes an OIDC discovery document — making it suitable for non-standard providers, development/testing identity servers, and custom-built identity systems.
Use Cases
- Non-standard OIDC providers — Connect identity providers that aren’t covered by the dedicated connectors (Azure AD, Okta, etc.)
- Development and testing IdPs — Integrate with local identity servers like Keycloak, Dex, or mock OIDC providers during development
- Custom-built identity systems — Connect to in-house identity services that implement the OIDC specification
Configuration
- Console UI
- Configuration
Console UI documentation is coming soon. This section will walk you
through configuring this component using the Maverics Console’s visual
interface, including step-by-step screenshots and field descriptions.
Configuration Reference
| Key | Type | Required | Description |
|---|---|---|---|
name | string | Yes | Unique connector identifier referenced in app policies |
type | string | Yes | Must be oidc |
oidcWellKnownURL | string | Yes | OIDC discovery endpoint URL |
oauthClientID | string | Yes | OAuth 2.0 client ID from the identity provider |
oauthClientSecret | string | Yes | OAuth 2.0 client secret (use secret reference syntax) |
oauthRedirectURL | string | Yes | Callback URL registered with the identity provider |
scopes | string | No | Space-separated OAuth scopes (default: openid profile email) |
oauthExtraParams | map | No | Additional query parameters for the authorization request |
tls | string | No | Named TLS profile for provider communication |
Troubleshooting
- Verify the
oidcWellKnownURLis accessible from the Orchestrator host — confirm the provider’s discovery document returns valid JSON - Ensure the
oauthRedirectURLmatches exactly what is registered in the identity provider - Check that the client secret reference resolves correctly via your secret provider