OIDC / OAuth 2.0
Prerequisites
The security provider must have users, roles, and passwords correctly established by the Administrator prior to implementation.
The newly integrated OAuth authentication mechanism utilizes OIDC-based authorization_code authentication, while the security provider will handle the authorization.
Users have the flexibility to configure multiple OAuth providers.
To enable OAuth functionality with Pentaho login, make the following changes:
Enable OAuth & specify Security Provider
Update OIDC Configuration
Enable OAuth & Specify Security Provider
For this Step you will be updating <PENTAHO_HOME>/pentaho-server/pentaho-solutions/system/security.properties.
OAuth is disabled by default with enable-oauth-authentication=false. Administrators can enable it by setting this flag to true: enable-oauth-authentication=true.
Next, you will need to establish the security provider.
Specify Security Provider
Jackrabbit and LDAP serve as security providers while OAuth functions solely as an authentication mechanism in Pentaho Server. Please contact support to understand why these choices were made.
In order to specify the security provider, you must first decide the approach for managing user-role mappings.
If you expect to manage user roles in Pentaho, then set
provider=jackrabbit. You will then have to assign roles to users in Pentaho User Console. See <link> for details.If you expect to manager user roles in LDAP, then <waiting for input from Sathish and Vamsi to complete this>.
Update OIDC Configuration
For this step, you will be updating <PENTAHO_HOME>/pentaho-server/pentaho-solutions/system/applicationContext-spring-security-oauth.properties
applicationContext-spring-security-oauth.properties is the central configuration file for OAuth2/OIDC authentication in Pentaho 11.0. It serves as the primary interface for administrators to:
Enable/disable OAuth authentication
Configure multiple Identity Providers simultaneously
Set up client registrations for different IdPs (Keycloak, Okta, Azure, etc.)
Core Identity Properties:
registration-id- Unique identifier for the IdP configuration.client-name- Display name for the IdPclient-id/client-secret- OAuth2 client credentials from the IdPposition- Display order on the login pageuser-name-attribute-name- used for mapping with username created by administrator in Pentaho jackrabbit/LDAP.authorization-grant-type- Auth flow type. By default,authorization_codeis the OAuth2 flow type.scope- Requested permissions (typicallyopenid,profile,email). Scopes ensure IDP access token has necessary data
The registration-id value must match the prefix used for all related properties.
For e.g., keycloak.registration-id=keycloak ,
Then ALL related properties for that IdP must use the keycloak. prefix:
keycloak.registration-id=keycloak keycloak.client-name=keycloak keycloak.client-id=your-client-id keycloak.client-secret=your-client-secret keycloak.scope=openid,profile,email keycloak.redirect-uri=http://... keycloak.token-uri=http://...
OIDC Endpoints:
token-uri- IdP's token endpointauthorization-uri- IdP's authorization endpointjwk-set-uri- IdP's public keys for token validationuser-info-uri- IdP's user information endpointredirect-uri- Callback URL after IdP authenticationend-session-endpoint- Logout endpoint for IdPpost-logout-redirect-uri- Redirection uri after IDP session is logged out
Once the above steps are completed and you restart Pentaho Server, the login screen should show options to login via the IdP(s) you have configured above. For example, if Azure Entra, Keycloak, and Okta are all configured you will see the following:

OR (if you have the new experience configured):

Last updated
Was this helpful?

