1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57
|
## EGI Check-in
EGI Check-in supports dynamic registration, but dynamically registered clients will not have any scopes. Therefore,
users have to either register a client manually or use a preregistered public client (recommended).
Example:
```
$ oidc-gen --pub --issuer https://aai.egi.eu/oidc \
--scope "email \
eduperson_entitlement \
eduperson_scoped_affiliation \
eduperson_unique_id" <shortname>
```
You will need to follow the OIDC-flow, which usually involves
authentication in a web-browser. If the browser does not start, you can
copy paste the displayed URL.
```
[...]
Generating account configuration ...
accepted
To continue and approve the registered client visit the following URL in a Browser of your choice:
https://[...]
[...]
Polling oidc-agent to get the generated account configuration .....success
The generated account config was successfully added to oidc-agent. You don't have to run oidc-add.
```
Finally, you will be be asked for a password on
the commandline to safely store your credentials.
```
Enter encryption password for account configuration '<shortname>':
Confirm encryption Password:
```
**Note**: You need to run the webbrowser on the same host as the
`oidc-gen` command.
\
If you operate on a remote machine, you need to use the
device code flow, by adding `--flow=device` to the above commandline.
Advanced users may succeed by otherwise ensuring that the browser you are using can connect to the host on
which `oidc-gen` and `oidc-agent` run on ports 4242, 8080 or 43985.
<!--This only happens once a year with EGI-->
<!--### Advanced options-->
<!--If you register a client manually you have the option to disable 'Refresh tokens-->
<!--for this client are reused'. If you disable this option each refresh token can-->
<!-- only be used once. Therefore, a new refresh token will be issued after each-->
<!-- refresh flow (whenever a new access token is issued). When the refresh token-->
<!-- changes oidc-agent has to update the client configuration file and therefore-->
<!-- needs the encryption password. Because with rotating refresh tokens, this will-->
<!-- happen quite often it is recommended to allow oidc-agent to keep the password-->
<!-- in memory by specifying the `--pw-store` option when loading the account-->
<!-- configuration with `oidc-add`. -->
|