Configuring Custom Identity Providers for Single Sign On
Use the following procedure to configure a single sign on connection with an external identity provider to be used with Fortra platform. This will add an entry to the single sign on page of the login process, in addition to the existing Google, Microsoft, and Email options.
The following information relates to creating an OIDC connection. If your identity provider does not support this authentication method, please reach out to Fortra support.
Configuring Microsoft Entra ID (formerly Azure Active Directory)
Initial Configuration
-
Sign in to the Microsoft Entra admin center. You need to be at least a Cloud Application Administrator.
-
From the navigation, click Applications and then App registrations.
-
Click New registration.
-
Enter a name and click register. We recommend naming it Fortra.
-
Navigate to the Certificates & secrets section of your application.
-
Click New client secret.
-
Enter a name for the secret and click Add.
-
Now that your client secret has been created, copy its value and store it somewhere accessible and secure as it will be needed for a later step.
-
Navigate to the Overview section of your application.
-
Copy and store the Application (client) ID.
-
Click Endpoints.
-
Copy and store the OpenID Connect metadata document field.
-
Save your application.
Platform Configuration
-
Sign in to the Fortra platform.
-
Navigate to Platform Manager.
-
In the left menu, click System, then Login Options.
-
Click Add IDP.
-
Enter an appropriate Display Name. This is the name that will appear on the platform login page.
-
Fill in the remaining fields that were copied and stored from Microsoft Entra ID:
-
Client ID = Application (client) ID
-
Client Secret = Client Secret Value
-
Metadata URL = OpenID Connect metadata document field
-
Enter a Rank where you would like this provider to appear on the login page. The lowest rank will appear first.
-
Click Save.
-
Click
Actions next to the provider you just created and select Details.
-
Copy and store the details.
Finalize Configuration
-
Sign in to the Microsoft Entra admin center. You need to be at least a Cloud Application Administrator.
-
From the navigation, click Applications and then App registrations.
-
Select the application you previously created.
-
Navigate to the Branding & properties section of your application.
-
In the Home page URL field, enter the Initiate login URL that you copied from the Provider details in the platform.
-
Click Save.
-
Navigate to the Authentication section of your application.
-
Under Platform configurations, select Add a platform.
-
Select Web.
-
In the Redirect URL field, enter the Sign-in redirect URL that you copied from the Provider details in the Platform.
-
(Optionally) In the Front-channel logout URL field, enter the Sign-out redirect URL that you copied from the Provider details in the Platform. This enables Single Log Out.
-
Select Access tokens (used for implicit flows).
-
Select ID tokens (used for implicit and hybrid flows).
-
Click Configure.
-
-
Click Enterprise applications from the navigation.
-
Select your application.
-
Navigate to Users and groups.
-
Assign the application to users/groups as required.
Configuring Okta
Initial Configuration
-
Navigate to the Okta Admin portal.
-
Click Applications from the navigation menu.
-
Click Create App Integration.
-
Select OIDC – OpenID Connect.
-
Select Web Application.
-
Click Next.
-
Enter an appropriate application name.
-
Under Grant Type select Authorization Code and Refresh Token.
-
Under Assignments select Skip group assignment for now.
-
Click Save.
-
Under Client Credentials, copy and store the Client ID and Secret.
Platform Configuration
-
Sign in to the Fortra platform.
-
Navigate to Platform Manager.
-
In the left menu, click System, then Login Options.
-
Click Add IDP.
-
Enter an appropriate Display Name. This is the name that will appear on the platform login page.
-
Fill in the remaining fields that were copied and stored from Okta:
-
Client ID
-
Client Secret
-
Metadata URL = https://<okta-domain>/.well-known/openid- configuration?client_id=<client_id>
-
Enter a Rank where you would like this provider to appear on the login page. The lowest rank will appear first.
-
Click Save.
-
Click
Actions next to the provider you just created and select Details.
-
Copy and store the details.
Finalize Configuration
-
Navigate to the Okta Admin Portal.
-
From the navigation, click Applications.
-
Select the application you previously created.
-
Under General Settings, click Edit.
-
Enter the values copied from the Provider details in the platform.
-
Update the Login initiated by field to either Okta or App.
-
Click Save.
-
Click the Assignments tab to view application assignments.
-
Assign the application to users/groups as required.