Adding Feide login to a service¶
The process for adding Feide login to a service varies greatly between different services. Some services have built-in support for federated login / single sign on that can be used with Feide. Other services may required you to add a custom authentication plugin.
Under the tab configurations you add configuration so that the Feide-system is able to communicate with the service. Feide supports two different authentication protocols:
Some services only need a single configuration, while others may need separate configurations for each organization with access to the service.
Factors that may affect your choice of protocol is:
The OpenID Connect protocol in Feide is available for users from organizations that are connected to “nye Feide”.¨ Over 90% of all organizations that are connected to Feide have “new Feide” , but there are still a few organizations that do not have access. For an overview of which organizations have “Nye Feide” enabled, see q.feide.no
Existing support in applications / frameworks: Some applications and web frameworks have built-in support for one of the protocols. In that case, it is usually easiest to use the protocol already supported.
Support for logging into mobile applications: The OpenID Connect protocol is simpler to use when logging into mobile applications. Using this protocol, you can now choose not to require a new login after eight hours, but leave the user logged in for a longer period, in line with what end users often expect from mobile applications today.
Using the OpenID Connect protocol allows your mobile application to directly get an OAuth 2.0 access token, that can be used to access APIs.
Using OpenID Connect a service can retrieve information about teachers and students in a group, without each student having logged in beforehand. For primary school, secondary school and upper secondary school retrieve information about grade level (Grep), courses, basis groups, teaching groups and possibly other groups. For Universities and university colleges the group data is from FS (Common Student System), which provides information which class, class, study program, field of study and subject affiliation
Complexity of the protocol: The OpenID Connect protocol is in general simpler than the SAML 2.0 protocol.
Do you service need to identify and authenticate international users or people outside the education? When using OpenID Connect a service can enable other login providers in addition to Feide login like social networks, ID-porten, eduGain and eIDAS. Read more about login provider when using OpenID connect.
Depending on the software used to implement the service and the architecture of the service, there are several methods that can be used to integrate the service with Feide.
Some software or software frameworks may already have support (either directly in the software or through plugins) for SAML 2.0 or OpenID Connect.
In some cases, authentication can be handled by a web proxy that runs in front of the software. This proxy can perform the Feide-authentication and pass user data to the application through request headers.
You can add support for Feide directly into the software. If you go for this solution, we strongly encourage you to use existing libraries that implement the SAML 2.0 protocol or OpenID Connect protocol. This is because the protocols can be very complicated, especially the SAML 2.0 protocol.
Adding Feide login to the service¶
Once you have decided on a protocol and itegration method, you can add Feide login to the service. The exact method for performing this depends on the software, frameworks and libraries used. Please refer to the documentation of the relevant software for details about how to configure a SAML 2.0 / OpenID Connect integration.
In general it will be something like the following:
Add any required plugins/components/libraries to the service.
Configure the software to connect to the Feide login system.
For OpenID Connect, we do not have a separate test system. but you can test without publishing the service. The OpenID Connect configuration is available in OpenID Connect Discovery format from our login system. If the software supports OpenID Connect Discovery, you can configure the software with the following
Issuer, and it should automatically fetch the required configuration: https://auth.dataporten.no
Determine what attribute groups your software needs to work.
The user information is transferred to the service as attributes groups in the login response. The software can typically make the attributes groups available to your service in various ways.
Think about what information the service needs to know about the user and host organization. Avoid requesting access to more information than the service needs to work. Some services only need to log in to ensure that there is a person associated with the education sector, while others need more to personalize the service for the user. If you find out later that the service needs more information about the user, you can add more attribute groups.
For an overview over available attributes, see the section about our attribute groups.
Registering the service in Feide¶
Once you have decided on a protocol and integration method, you can register the service in the Feide customer portal.
Screenshot of services provider by the organization
When registering a new service, the steps of information that need to registered is showed in the left side under “Prepare for publication”. You need to fill out the required filed that are marked with * to publish the service. Other details that are not required are optional to register but can be useful for the administrator at the host organizations and end users.
Screenshot of services provider by the organization
Adding information about the service¶
Under the “About the service” tab you add details about you service. Take special care to fill in understandable details about your service, including name, description, logo and more. This information will be displayed to end users during login and on our overview over service with Feide login.
Selecting user information¶
Under the “User information” tab you select which information the service needs to receive about the end user and the host organization, there you can choose what information the service should try to collect about end users as they login with Feide. The availability of the information depends on whether it exists in the host organizations user directory. The information is defined in the attribute groups and for an overview over available attributes, see the section about our attribute groups.
Some of the attribute groups is by the general public and Feide considered as semi-sensitive information. Those attribute groups are only released to service that actual need it to make a better service and/or can’t user other information. Therefore, it can only be added to a service by Sikt. Send an email to firstname.lastname@example.org and explain why the service requires this attribute group, and why it is not enough with another available information through Feide.
Beware that some attributes groups and attributes in attributes groups are only available with SAML configuration or for OIDC configuration.
Under the “Configuration” tab you add configuration/configuration to the services so, the Feide-system can communicate with your service. Some services only need a single configuration, while others may need separate configurations for each organization with access to the service.
Feide supports two different authentication protocols: SAML 2.0 and OpenID Connect/OAuth.
If you are integrating with OpenID Connect/OAuth protocol you can enable other login providers in addition to Feide login like social networks, ID-porten, eduGain and eIDAS. This is done for service that need to identify and authenticate international users and/or people outside the education and not only users with Feide users. Enabling other login providers is done when adding or editing the OIDC-configuration. Read more about login provider when using OpenID connect.
If you have configuration that need to be moved for another service registered under the same organization, you can move them your self-clicking “Move configurations” under the more menu (…) for the specific configuration. If the configuration needs to be moved across service provider contact us at email@example.com, and we will move configuration to the right service provider for you.
Personal services are not included in the customer portal and manage in the dashboard dataporten until the solution is phased out. Those service can’t be activated by a host organization and are not included in the service search for the host organization. Personal services were intended for testing only and not for production. We recommend registered all services under an organization included when testing and if you have registered a personal service that it is moving them to the organization they belong to. Contact us at firstname.lastname@example.org, and we will move configuration from associated personal user to a service provider for you.
Testing the integration¶
When the service is registered in Feide, you can test the integration before publishing it.
To enable login for Feide test users you check this box for test users when adding or editing OIDC-configuration for a service in the Feide customer portal under “Configuration” for the service. For OIDC-configuration check of for Service provider-organization and for SAML-configuration the Feide-organization.
Be sure to disable Feide test user before you move your service to a production environment.
Screenshot of enabling Feide test users
To get the test users send an e-mail to email@example.com with information about which configuration is used and what type of organization the test users should come from (Primary and lower secondary schools, upper secondary schools and/or universities/university colleges). To check what information is registered about the user, log in to innsyn.feide.no with the test user. We have some standard test users that can be used for testing, but we can also create a couple of new test users if it’s necessary for testing the service.
Start login in the service, and you should then be sent to the Feide login system. Select “Feide” as the organization for SAML or “Feide test users” under “Other loging alternatives for OIDC”, and login using the username and the password. You should then be sent back to your service.
How to enable Feide login¶
You enable which organizations that get access to activate under the tab “Host organization”. There you also get an overview which organization that have activated the service. This is because Feide is an opt-in this means that before an organization can use a service, the organization must activate login to the service.
Screenshot of host organizations tab
Screenshot of setting editing activation access
When giving activation access you can select specific organization to give access to or you can give access to all primary and lower secondary schools, upper secondary schools, universities / university colleges and/or other organizations. Here you also can remove the check box for organization who will no longer be able to activate. After making changes remember to press “Save”.
If the service is publishing the organization/organization have access to active the service. Each individual organization must actively choose to activate the service.This is done in Feide’s customer portal by a Feide administrator at the host organization. There they can search after the service by the name of the service, name of the service provider and service description. Only after the service have been active the organization is an option in the Feide login for the user and the user can login to the service.
Do you service need to identify and authenticate international users or people outside the education? When using OpenID Connect a service can enable other login providers in addition to Feide login this is done under “configuration” tab. More information about login provider avable for OIDC-configurastion.
NB! Feide is an opt-in this means that before an organization can use a service, you as service provider need to give access and the organization must activate login to the service before the service is avaible for the user at the organizations.
Screenshot of publishing the service
You can remove the service and we recommend that all service that are no longer in uses get removed for a better overview over available services.
If you are still testing the service, we recommend that you unpublish the service or removes the services from public list and API. If you choose to unpublish the service is no longer available in the service search for the host organizations and cannot be activated. If you only removed the service for public list and API the service gets removed from list like the list of available services in Feide but is still available in-service search.
Screenshot of status of the service