X4 Produktdokumentation
Breadcrumbs

X4 Designer

Integration of OIDC

Starting with version 7.5, the X4 Designer supports OpenID Connect (OIDC) as an authentication method. This allows authentication via any OIDC-compliant identity provider. A Keycloak instance is no longer required.

In the X4 Designer, three options are now available in the Authentication drop-down list under Connection Properties in the X4 Preferences dialog box:

  • Basic

  • OIDC

  • No Auth

image-20260224-130736.png
Basic


image-20260224-130545.png
OIDC


image-20260224-130638.png
No Auth


Basic

The Basic authentication option works as in previous versions:

  1. To do this, select Basic from the Authentication drop-down list.

  2. Enter the user name and password.

OIDC

To use OIDC, you must specify the URL of your identity provider and a client.

Example:

OIDC URL: https://x4-dev-keycloak.azurewebsites.net/realms/OIDC-Test
Client: X4Designer

Action required

Additional adjustments to the server are required for the connection to the server to work with OIDC. For instructions, see X4 Server | What's New when Using Keycloak with OIDC.

No Auth

Use the No Auth mode only in development or test environments. An identity provider should always be used in production environments.

Action required

To use the No Auth authentication, it must first be enabled on the server. The instructions can be found at X4 Server | OpenID Connect.

Using Keycloak with OIDC

Action required

If you want to use a local X4 Keycloak instance, you can still configure it and use it to connect with OIDC. You can find the instructions under X4 Server | Using existing Keycloak installation with OIDC .


Changes in the .wsinc editor

In the .wsinc editor, changes were made to the Access Restriction area in version 7.5.

image-20260318-132355.png

The following fields are deprecated:

  • Realm

  • Client ID

  • Client Secret

Instead, the new Auth Config Name field is available. This field is used to reference an authentication configuration defined in the authentication_config.xml file.