Skip to main content
The OIDC Provider mode configures the Maverics Orchestrator as an OpenID Connect authorization server. It sits between your applications and upstream identity providers — handling authentication flows, enriching claims from multiple sources, and providing seamless IdP failover without application changes.
Console terminology: In the Maverics Console, the combination of applications, policies, headers, and connector bindings is managed through User Flows. In YAML, these elements are configured directly within each app’s configuration block under apps[].policies[].
When to use this mode
  • OIDC Provider — Choose this mode when your applications support OpenID Connect. Best for modern apps that can consume OIDC tokens natively.
  • SAML Provider — Choose this mode for applications that only support SAML 2.0 assertions.
  • HTTP Proxy — Choose this mode when you cannot modify the application’s authentication code.
  • LDAP Provider — Choose this mode for applications that require an LDAP directory for authentication.
  • AI Identity Gateway — Choose this mode for securing AI agent-to-tool communication via MCP.

Use Cases

  • SSO consolidation — Unify multiple identity providers behind a single OIDC-compliant interface, giving users one login experience across all applications.
  • IdP migration with zero downtime — Route authentication traffic between old and new identity providers during migration without disrupting end users.
  • Legacy app modernization via OIDC — Add OpenID Connect support to applications that previously relied on proprietary or outdated authentication mechanisms.
  • Claim enrichment from multiple sources — Aggregate user attributes from directories, databases, and APIs into a single enriched token for downstream applications.

How It Works

The OIDC Provider authentication flow follows these steps:
  1. Application redirects — A user accesses an application registered as an OIDC relying party. The application redirects the user to the Orchestrator’s authorization endpoint.
  2. Upstream authentication — The Orchestrator routes the user to the configured upstream identity provider (Microsoft Entra ID, Okta, etc.) for authentication. If multiple IdPs are configured, failover rules determine which to use.
  3. Attribute enrichment — After authentication, the Orchestrator loads additional attributes from configured attribute providers (directories, databases, APIs) and enriches the user’s profile.
  4. Token issuance — The Orchestrator generates OIDC tokens (ID token, access token, optional refresh token) with claims mapped from the authenticated identity and enriched attributes.
  5. Application receives tokens — The application receives the tokens at its redirect URI and uses them for session establishment and authorization decisions.
  6. Ongoing token operations — The Orchestrator serves the JWKS endpoint for token verification, handles token introspection and revocation, and manages token refresh flows.

Key Concepts

Provider vs Apps

The OIDC Provider has two configuration levels: provider-level settings (issuer, endpoints, signing keys) shared across all OIDC apps, and individual app entries that each register a specific relying party (client application) with its own credentials, scopes, and claims mapping. One Orchestrator can serve many OIDC apps.

Claims Mapping

Claims mapping translates attributes from upstream identity providers into OIDC token claims. The format connector.attribute (e.g., upstream-idp.email) references a specific claim from a named connector. This enables enriching tokens with data from multiple identity sources.

IdP Failover

When multiple identity providers are listed under authentication.idps, the Orchestrator tries them in order. If the primary IdP is unavailable, authentication falls back to the next provider seamlessly — no application changes required.

Token Types

The Orchestrator issues two token formats: JWT tokens (self-contained, verified via JWKS) and opaque tokens (reference tokens, verified via introspection). Choice depends on whether resource servers can validate locally or must call back.

Service Extensions

Go-based extension hooks allow custom logic at key points in the flow — custom authentication checks, custom claim building, and custom attribute loading. These provide escape hatches when standard configuration is insufficient.

Setup

In the Maverics Console, OIDC Provider settings are configured in the Deployment Settings dialog under the OIDC Provider section.Issuer and Endpoints
FieldRequiredDescription
IssuerYesCase-sensitive HTTPS URL that identifies this OIDC Provider. Used as the iss claim in issued tokens.
GenerateButton that auto-generates all endpoint URLs from the Issuer domain.
Well-KnownYesOIDC discovery endpoint (auto-generated from Issuer).
AuthorizationYesAuthorization endpoint for login flows (auto-generated).
TokenYesToken endpoint for code exchange and refresh (auto-generated).
IntrospectYesToken introspection endpoint (auto-generated).
RevocationYesToken revocation endpoint (auto-generated).
End SessionYesEnd session / logout endpoint (auto-generated).
User Info Claims
FieldRequiredDescription
User InfoYesUserInfo endpoint URL (auto-generated from Issuer).
Build User Info Claims SENoDropdown to select a Service Extension for customizing UserInfo response claims.
JSON Web Keys
FieldRequiredDescription
JWKSYesJWKS endpoint URL for publishing public keys (auto-generated from Issuer).
Edit JSON Web KeysButton to edit private/public key pairs used for token signing.
Additional Settings
FieldRequiredDescription
Redis CacheNoDropdown to select a configured Redis cache. Defaults to in-memory if not set.
Session CorrelationNoToggle to correlate OIDC sessions with HTTP sessions.
The Console UI provides a subset of the full YAML configuration. Options like buildUserInfoClaimsSE parameters, advanced JWKS algorithm settings, and per-app grant type selection are only available in YAML or at the app level. The Console auto-generates endpoints from the Issuer URL; in YAML, each endpoint is set independently.
The OIDC Provider mode works with all Identity Fabric connectors. The Orchestrator translates between any upstream IdP protocol and OIDC tokens for your applications. These are the most commonly used pairings: See the connector compatibility matrix for all supported pairings and the Identity Fabric overview for the full connector list. The OIDC Provider also pairs with:
  • Secret Providers — Store signing keys and client secrets securely
  • Caches — Distributed token and session storage with Redis