Tested with Google's OpenID Connect and AAF and KeyCloak
This plugin requires updates in the XDAT and Xnat-web code comming in 1.7.5. At the time of writing only the release candidate 1 is available.
This is only tested with a snapshot build of RC1.
-
Clone the XDAT project, then checkout the 1.7.5-RC branch:
git checkout 1.7.5-RC
-
Build the project using the instructions provided (mvn clean install).
-
Clone the [XNAT-web project]https://bitbucket.org/xnatdev/xnat-web.git), then checkout the 1.7.5-RC branch:
git checkout 1.7.5-RC
. -
Build the project using the instructions provided or simply
./gradlew clean war
-
Deploy the resulting war file at
webapps
into your Tomcat application.
When you have deployed the specific version of XNAT Web, you will need to deploy this XNAT plugin. For more information, please XNAT documentation on how to deploy plugins.
To build the XNAT OpenID authentication provider plugin:
-
If you haven't already, clone this repository and cd to the newly cloned folder.
-
Build the plugin:
./gradlew clean fatJar
This should build the plugin in the file build/libs/xnat-openid-auth-plugin-all-1.0.1-SNAPSHOT.jar (the version may differ based on updates to the code).
-
Copy the plugin jar to your plugins folder:
cp build/libs/xnat-openid-auth-plugin-all-1.0.1-SNAPSHOT.jar /data/xnat/home/plugins
After deploying the plugin, you will need to configure it.
XNAT searches for authentication plugin configurations by looking for files whose names match the pattern:
*-provider.properties
It looks in the following locations:
- On the classpath in the folder META-INF/xnat/auth
- In a folder named config/auth under the XNAT home folder (usually configured with the xnat.home system variable)
This plugin will use any entries located in any of those properties files where the property type is set to "openid". See the sample properties in the resources directory.
The following properties control the plugin:
Comma delimited list of provide ids, currently tested with Google google
, AAF aaf
and KeyCloak keycloak
.
The main domain, needed to build the full preEstablishedRedirUri
The return leg of OpenID request after the provider has authenticated, defaults to <siteUrl>/openid-login
The ID obtained on app registration
The Secret obtained on app registration
Controls the scopes returned by the server: openid,profile,email
Controls the link HTML snippet displayed on the Login page for this provider. Location of the link text can optionally be customised by modifying Login.vm
.
Controls whether domains of the email should be compared against the whitelist: allowedEmailDomains
.
Comma delimted whitelist of domains.
Allows skipping of user creation, usually set to true.
Flag to set the enabled
property of new users, set to false to allow admins to manually enable users before allowing logins, set to true to allow immediate access.
Flag to set the verified
property of new users.
The property names used to populate user information during user creation. These are the property names from the information returned from the authentication provider.
Toggle username & password login visibility on the login form
Sample configuration files are found here. Please note the need to rename these files before usage, see opening section of the file.