Skip to content

Setting Up Blitz Oauth Connection

This article is an example of configuring an OIDC connection.

This guide is suitable for the Enterprise version. Tested on Blitz Identity Provider version 5.28.4.19282.

Before configuring the connection, you need to set up an Oauth client on the Blitz Identity Provider side. To do this, create an application for connecting to GitFlic. Select the Applications section in the Blitz management console and click the Create Application button.

Creating Oauth Client

In the area that appears, enter the identifier (which will later be used as the client_id), the client name, and the domain—the start page for redirection after successful authentication.

Creating Oauth Client

After clicking the Save button, the new connection will appear in the list. For proper operation with GitFlic, select the edit button to continue configuration. The connection editing page will open:

Configuring Oauth Client

Save the client_id value and the client_secret field value for further configuration in GitFlic. Set the Default return link value as the GitFlic URL + /oidc/callback. Specify the return link prefix as the GitFlic URL. Set Allowed permissions and Default permissions as shown in the screenshot below. Also, set the Authentication method when accessing the token issuance service to client secret post.

Configuring Oauth Client

For proper synchronization of user data, set the Default access token issuance mode to offline.

Configuring Oauth Client

Next, go to the Data Sources section and add a new computed attribute. You can specify a value or a combination of values that will be used in GitFlic as the users' username.

Important! It is recommended to specify a unique and immutable attribute/combination of attributes, as the GitFlic username must be unique.

Adding preferred_name to client

Then go to the Oauth 2.0 section and add preferred_username to the user's profile data:

Adding preferred_name to profile data list

After saving all changes, you need to add Blitz Identity Provider as an authentication provider in GitFlic. To do this, you can use this guide.

Automated translation!

This page was translated using automatic translation tools. The text may contain inaccuracies.