Ganesh Dutt Sharma, Pleaswe find attached our moodle setting
Provider Name
auth_oidc | opname
OpenID Connect
Default: OpenID Connect
This is an end-user-facing label that identifies the type of credentials the user must use to login. This label is used throughout the user-facing portions of this plugin to identify your provider.
Client ID
auth_oidc | clientid
Moodle_test1
Default: Empty
Your registered Client ID on the identity provider
Client Secret
auth_oidc | clientsecret
Moodle1
Default: Empty
Your registered Client Secret on the identity provider. On some providers, it is also referred to as a key.
Authorization Endpoint
auth_oidc | authendpoint
https://authsso.aiims.edu/oxauth/restv1/authorize
Default: https://login.microsoftonline.com/common/oauth2/authorize
The URI of the Authorization endpoint from your identity provider to use.
Token Endpoint
auth_oidc | tokenendpoint
https://authsso.aiims.edu/oxauth/restv1/token
Default: https://login.microsoftonline.com/common/oauth2/token
The URI of the token endpoint from your identity provider to use.
Resource
auth_oidc | oidcresource
Default: https://graph.windows.net
The OpenID Connect resource for which to send the request.
Redirect URI
auth_oidc | redirecturi
http://192.168.185.107/moodle/auth/oidc/
This is the URI to register as the "Redirect URI". Your OpenID Connect identity provider should ask for this when registering Moodle as a client.
NOTE: You must enter this in your OpenID Connect provider exactly as it appears here. Any difference will prevent logins using OpenID Connect.
Auto-Append
auth_oidc | autoappend
Default: Empty
Automatically append this string when logging in users using the "Resource Owner Password Credentials" authentication method. This is useful when your identity provider requires a common domain, but don't want to require users to type it in when logging in. For example, if the full OpenID Connect user is "james@example.com" and you enter "@example.com" here, the user will only have to enter "james" as their username.
Note: In the case where conflicting usernames exist - i.e. a Moodle user exists wth the same name, the priority of the authentication plugin is used to determine which user wins out.
Domain Hint
auth_oidc | domainhint
Default: Empty
When using the "Authorization Code" authentication method, pass this value as the "domain_hint" parameter. "domain_hint" is used by some OpenID Connect providers to make the login process easier for users. Check with your provider to see whether they support this parameter.
Authentication Method
auth_oidc | loginflow
Authorization Code Flow (recommended)
Using this flow, the user clicks the name of the identity provider (See "Provider Name" above) on the Moodle login page and is redirected to the provider to log in. Once successfully logged in, the user is redirected back to Moodle where the Moodle login takes place transparently. This is the most standardized, secure way for the user log in.
Resource Owner Password Credentials Grant
Using this flow, the user enters their username and password into the Moodle login form like they would with a manual login. This will authorize the user with the identity provider, but will not create a session on the identity provider's site. For example, if using Office 365 with OpenID Connect, the user will be logged in to Moodle but not the Office 365 web applications. Using the authorization request is recommended if you want users to be logged in to both Moodle and the identity provider. Note that not all identity providers support this flow. This option should only be used when other authorization grant types are not available.
User Restrictions
auth_oidc | userrestrictions
Default: Empty
Only allow users to log in that meet certain restrictions.
How to use user restrictions:
Enter a regular expression pattern that matches the usernames of users you want to allow.
Enter one pattern per line
If you enter multiple patterns a user will be allowed if they match ANY of the patterns.
The character "/" should be escaped with "\".
If you don't enter any restrictions above, all users that can log in to the OpenID Connect provider will be accepted by Moodle.
Any user that does not match any entered pattern(s) will be prevented from logging in using OpenID Connect.