On-premises
User Management
Visual Layer ADFS (OIDC) Integration Guide
This document provides all necessary instructions to integrate your Identity Provider (IdP) — such as ADFS — with Visual Layer’s platform using the OpenID Connect (OIDC) protocol.
We will work together to ensure a smooth Single Sign-On (SSO) experience.
Overview: OIDC Flow
- The user tries to log in to Visual Layer and is redirected to your IdP (OpenID Provider, OP) with the client ID.
- The IdP authenticates the user.
- The user is redirected back to a predefined Redirect URI with an authorization code.
- Visual Layer exchanges this code, along with the client ID and secret, for Access and ID tokens.
- Optionally, additional user details can be retrieved using the Access Token via the UserInfo endpoint.
Information Required from Your Side
1. Well-Known Configuration URL
- Please provide your IdP’s OpenID configuration URL (e.g.,
https://<your-adfs-domain>/adfs/.well-known/openid-configuration
). - This allows us to automatically fetch metadata like authorization endpoints.
2. Client ID and Client Secret
- Generate these credentials on your IdP (ADFS or any OIDC-compliant provider).
- We will use these securely to authenticate against your IdP.
3. Allowed Scopes
- Please confirm which scopes are supported.
- Typical scopes include:
openid, profile, email
4. Example Tokens
- No need to send real user tokens.
- Please provide an example ID token and, if possible, a UserInfo response showing the available user claims.
Information We Will Provide
1. Redirect URI
- Please configure this URI in your IdP:
- This is where users will be redirected after authentication.
Required Changes in Your OpenShift Settings
Update or Add the Following Settings:
Frontend (FE) Settings:
Tip: To generate a random storage key:
Permissions Management
- User access will be managed via the Dataset Manager Script.
- The customer-facing script is available here:
Dataset Manager Script on GitHub
Additional Notes
- If needed, we can assist you with ADFS configuration, token structure validation, or claim mapping.
- We support both cloud and on-premises deployments.
- On-prem users: if you’re interested in an evaluation, we can provide a trial version to test before committing.