OpenID 2.0 Auth Module
In addition to the OpenID providers that are supported with built-in authentication modules, Hub lets you enable authentication for any OpenID provider that uses OpenID 2.0.
Enable OpenID Authentication
To allow users to sign in to Hub with OpenID authentication, enable an OpenID authentication module.
To enable OpenID authentication:
In the Access Management section of the Administration menu, select .
From the Add Module drop-down list, select OpenID 2.0.
The Add Module dialog opens.
In the Add Module dialog, enter values for the following settings:
Enter a name for the authentication module.
Enter the server address of the OpenID provider. The provider defines the format that is required for the URL.
For details, refer to the documentation of the OpenID provider.
Click the Create Module button.
The OpenID authentication module is enabled.
The Auth Modules page displays the settings for the OpenID authentication module. For additional information about the settings on this page, see the Settings section.
The icon stored in the Button Image setting is added to the login dialog window. Users can click this icon to authenticate with their OpenID credentials.
The settings are configured automatically when the module is added to Hub. You do not have to change these settings. To configure the options that define how Hub treats new user accounts with OpenID credentials, see Additional Settings.
Displays the name of the application or service that is enabled for third-party authentication in Hub.
Stores the name of the authentication module. Use this setting to distinguish this module from other authentication modules in the Auth Modules list. The name is also shown in the tooltip for the third-party service icon on the login form.
Displays the image used for the button that a user clicks to log in to Hub with a their account in the connected authorization service. You can upload a JPG, GIF or PNG file. The image is resized to 48 x 48 pixels automatically.
Stores the URL of the OpenID provider used to authenticate a login request in Hub.
Use the following settings to map user data stored with the OpenID provider to user accounts in Hub.
Stores the location that contains the email address.
Email verification state
Determines which state should be set for an email address in Hub, when the authentication service does not return the verification status for an email address.
Stores the location that contains the first name of the user.
Stores the location that contains the last name of the user.
Stores the location that contains the full name of the user.
Stores the location that contains the avatar of the user.
When a user logs in to Hub with an OpenID account for the first time, Hub checks if an account with the same email address exists. If an account with the same email address exists, the OpenID credentials are added to the existing account.
Use the following settings to configure how Hub manages user accounts. These settings also let you reduce the loss of processing resources consumed by idle connections.
Enables creation of Hub accounts for unregistered users who log in with an account that is stored in the connected authorization service. Hub uses the email address to determine whether the user has an existing account.
Adds users to a group when they log in with an account that is stored in the connected authorization service. You can select one or more groups. New users that auto-join a group inherit all of the permissions assigned to this group.
Sets the period of time to wait to establish a connection to the authorization service. The default setting is 5000 milliseconds (5 seconds).
Sets the period of time to wait to read and retrieve user profile data from the authorization service. The default setting is 5000 milliseconds (5 seconds).
Links to the Audit Events page in Hub. There, you can view a list of changes that were applied to this authentication module.