1. Tableau Server Documentation: In the "Configure OpenID Connect" guide
Tableau specifies the exact format for the provider redirect URL. The troubleshooting section implicitly points to verifying this configuration. It states
"The provider redirect URL is used by the IdP to redirect users back to Tableau Server. For example
http://tableauserver/vizportal/api/web/v1/auth/openIdLogin." A mismatch here is a primary failure point.
Source: Tableau Server Help
"OpenID Connect
" Section: "Configure OpenID Connect."
2. OpenID Connect Core 1.0 Specification: The official protocol specification defines the redirecturi as a required parameter in the Authentication Request. It mandates an exact match with a pre-registered value for the client.
Source: OpenID Foundation
"OpenID Connect Core 1.0 incorporating errata set 1
" Section 3.1.2.1. "Authentication Request
" redirecturi parameter description.
3. University Courseware (MIT): In lectures on web application security and authentication protocols like OAuth 2.0 (which OIDC is built upon)
the redirecturi is highlighted as a critical security parameter that must be exact-matched to prevent token theft and replay attacks. Misconfiguration is a common implementation flaw.
Source: MIT OpenCourseWare
6.858 Computer Systems Security
Fall 2014
Lecture 17: "Web Security
" discussion on OAuth 2.0 vulnerabilities.