Admin console settings#

The admin console is configured using the console.conf and credentials files. The following subsections describe the possible settings.

Log-in to admin console via SSO#

You can configure Blitz Identity Provider admin console to log in via the OIDC Identity Provider. The provider can be the current installation of Blitz Identity Provider, a custom installation of Blitz Identity Provider, or even an external software if it is compatible with OIDC.

The following admin console login modes are supported:

  • standard mode by the account login/password created in the section Administrators;

  • login via SSO;

  • the hybrid mode of logging in when the administrator can log in both by the login/password in the standard mode and using SSO.

If you are using the SSO mode, you don’t have to create administrator accounts in the section Administrators.

To configure the admin console login mode via SSO, you must:

  • Register the application in the external identity provider (SSO) settings. The allowed return prefixes (redirect_uri) must include Blitz Identity Provider.installation domain. Get the client_id and client_secret of the application for the admin console after registration;

  • in the console.conf configuration file, create a login settings block with the following content:

  "login" : {
    "fp" : {
      "authUri" : "",
      "clientId" : "blitz-console",
      "clientSecret" : "client_secret_value",
      "logoutUrl" : "https://idp",
      "scopes" : [
      "subjectClaim" : "sub",
      "roleClaim" : "roles",
      "tokenUri" : ""
    "mode" : "sso"

You must specify parameters:

  • In the authUri``and ``tokenUri parameters, you must specify the addresses of the Authorization Endpoint and Token Endpoint handlers of the external identity provider.

  • In the clientId and clientSecret parameters, specify the client_id and client_secret values, assigned to the application registered in the external identity provider application that corresponds to the admin console parameters.

  • In the logoutUrl parameter, specify the link to which the user should be redirected user when logging out of the admin console, so that a single logout via an external identity provider.

  • In the scopes parameter, prescribe the list of scopes which must be requested (at least openid scopes are needed).

  • In subjectClaim specify the name of the attribute from the identity token (id_token) that is used as the account identifier. Using this identifier the administrator’s login will be performed in sso login mode.

  • Specify in roleClaim the attribute name from the identification token (id_token), in which the role (string) or the role list (array of strings) of the administrator is passed. Using these identifiers the administrator’s login will be performed in sso login mode.

  • In the mode parameter, you must specify the required login page mode: sso - login only using an external identity provider (see the figure below); internal - login only using the login and password from the administration console settings. If the parameter is not specified, both options are available at the user’s choice. It is not required to create administrator accounts in the Administrators menu prior to logging in via SSO Logging in via SSO.


To avoid showing an intermediate login screen where the user clicks the Logging in via SSO button, you can invoke the admin console using a link of the following form: https://hostname:port/blitz/console?mode=SSO.

Session limit#

Security policy may require that a user or administrator cannot be logged in from multiple devices at the same time. To fulfill this security policy for administrator access to the admin console, the session block must be added to the console.conf configuration file:

"session" : {
  "mode" : "exclusive",
  "check-interval" : 10

With this setting, if an administrator login is detected with an account that has already logged in, the previous login will display the login page in the admin console for any action. The check-interval setting (specified in seconds) specifies the period of time in seconds how quickly the previous session will be logged out when a new session appears.

If the security policy also requires to prevent multiple sessions for normal users, this mode can be selectively enabled for certain users when logging in to certain applications. This can be done by configuring the login procedure.

Additionally, in the web application User profile it is necessary to enable the setting according to which an early log out from the web application will take place in case the user account is blocked or the policy prohibiting multiple user logins has been violated. In the blitz.conf configuration file, in the settings block, add the check-session-interval setting, which specifies the period of session activity check by the web application:

"user-profile" : {
  "check-session-interval" : 10,

Roles and permissions for the console#

The standard administrator roles are described in the previous sections. In the credentials configuration file you can create additional administrator roles or correct access rights in existing roles. To do this, in the roles block, adjust the composition of access rights (privileges) corresponding to the role (name).

Example of configuration:

"roles" : [
    "name" : "new-role",
    "privileges" : ["w_app","w_system","w_ui","w_user","w_admin","r_audit"]

If new roles are created, text strings with role names must also be defined for them. Example of a text string for a new role new_role: role name

The list of available access rights for filling the privileges setting is given in the table below.

Blitz Identity Provider admin console access rights

Access rights

Available sections of the Admin console




Data sources, Authentication, Authentication flows, Identity providers, SAML, OAuth 2.0, Devices, Messages


Self-services, Login page themes


Administrators, Events


User search, Group search, Access rights


User search (read-only), Group search (read-only), Access rights (read-only)


Events (read-only)