Console terminology: In the Maverics Console, the combination of applications,
policies, headers, and connector bindings is managed through User Flows. In
YAML, these elements are configured directly within each app’s configuration block
under
apps[].policies[].Use Cases
- SSO consolidation — Unify multiple identity providers behind a single OIDC-compliant interface, giving users one login experience across all applications.
- IdP migration with zero downtime — Route authentication traffic between old and new identity providers during migration without disrupting end users.
- Legacy app modernization via OIDC — Add OpenID Connect support to applications that previously relied on proprietary or outdated authentication mechanisms.
- Claim enrichment from multiple sources — Aggregate user attributes from directories, databases, and APIs into a single enriched token for downstream applications.
How It Works
The OIDC Provider authentication flow follows these steps:- Application redirects — A user accesses an application registered as an OIDC relying party. The application redirects the user to the Orchestrator’s authorization endpoint.
- Upstream authentication — The Orchestrator routes the user to the configured upstream identity provider (Microsoft Entra ID, Okta, etc.) for authentication. If multiple IdPs are configured, failover rules determine which to use.
- Attribute enrichment — After authentication, the Orchestrator loads additional attributes from configured attribute providers (directories, databases, APIs) and enriches the user’s profile.
- Token issuance — The Orchestrator generates OIDC tokens (ID token, access token, optional refresh token) with claims mapped from the authenticated identity and enriched attributes.
- Application receives tokens — The application receives the tokens at its redirect URI and uses them for session establishment and authorization decisions.
- Ongoing token operations — The Orchestrator serves the JWKS endpoint for token verification, handles token introspection and revocation, and manages token refresh flows.
Key Concepts
Provider vs Apps
The OIDC Provider has two configuration levels: provider-level settings (issuer, endpoints, signing keys) shared across all OIDC apps, and individual app entries that each register a specific relying party (client application) with its own credentials, scopes, and claims mapping. One Orchestrator can serve many OIDC apps.Claims Mapping
Claims mapping translates attributes from upstream identity providers into OIDC token claims. The formatconnector.attribute (e.g., upstream-idp.email) references a specific claim from a named connector. This enables enriching tokens with data from multiple identity sources.
IdP Failover
When multiple identity providers are listed underauthentication.idps, the Orchestrator tries them in order. If the primary IdP is unavailable, authentication falls back to the next provider seamlessly — no application changes required.
Token Types
The Orchestrator issues two token formats: JWT tokens (self-contained, verified via JWKS) and opaque tokens (reference tokens, verified via introspection). Choice depends on whether resource servers can validate locally or must call back.Service Extensions
Go-based extension hooks allow custom logic at key points in the flow — custom authentication checks, custom claim building, and custom attribute loading. These provide escape hatches when standard configuration is insufficient.Setup
- Console UI
- Configuration
In the Maverics Console, OIDC Provider settings are configured in the Deployment Settings dialog under the OIDC Provider section.Issuer and Endpoints
User Info Claims
JSON Web Keys
Additional Settings
| Field | Required | Description |
|---|---|---|
| Issuer | Yes | Case-sensitive HTTPS URL that identifies this OIDC Provider. Used as the iss claim in issued tokens. |
| Generate | — | Button that auto-generates all endpoint URLs from the Issuer domain. |
| Well-Known | Yes | OIDC discovery endpoint (auto-generated from Issuer). |
| Authorization | Yes | Authorization endpoint for login flows (auto-generated). |
| Token | Yes | Token endpoint for code exchange and refresh (auto-generated). |
| Introspect | Yes | Token introspection endpoint (auto-generated). |
| Revocation | Yes | Token revocation endpoint (auto-generated). |
| End Session | Yes | End session / logout endpoint (auto-generated). |
| Field | Required | Description |
|---|---|---|
| User Info | Yes | UserInfo endpoint URL (auto-generated from Issuer). |
| Build User Info Claims SE | No | Dropdown to select a Service Extension for customizing UserInfo response claims. |
| Field | Required | Description |
|---|---|---|
| JWKS | Yes | JWKS endpoint URL for publishing public keys (auto-generated from Issuer). |
| Edit JSON Web Keys | — | Button to edit private/public key pairs used for token signing. |
| Field | Required | Description |
|---|---|---|
| Redis Cache | No | Dropdown to select a configured Redis cache. Defaults to in-memory if not set. |
| Session Correlation | No | Toggle to correlate OIDC sessions with HTTP sessions. |
The Console UI provides a subset of the full YAML configuration. Options like
buildUserInfoClaimsSE parameters, advanced JWKS algorithm settings, and per-app grant type selection are only available in YAML or at the app level. The Console auto-generates endpoints from the Issuer URL; in YAML, each endpoint is set independently.Related Integrations
The OIDC Provider mode works with all Identity Fabric connectors. The Orchestrator translates between any upstream IdP protocol and OIDC tokens for your applications. These are the most commonly used pairings:Microsoft Entra ID
Microsoft Entra ID for enterprise SSO
Okta
Okta SSO consolidation
Generic OIDC
Any OIDC-compliant provider
Continuity
IdP failover and migration
- Secret Providers — Store signing keys and client secrets securely
- Caches — Distributed token and session storage with Redis
Related Pages
OIDC App
Client application configuration, setup steps, and troubleshooting for OIDC apps
SAML Provider
Configure the Orchestrator as a SAML 2.0 identity provider for federation
Identity Fabric
Connect upstream identity providers to the Orchestrator
Architecture and Concepts
Understand how modes fit into the Orchestrator architecture
HTTP Proxy
Protect applications without code modification using reverse proxy mode