Howto Configure Admin Console OIDC AzureAD
Howto Configure Admin Console OIDC AzureAD
External IDP
p. 1
Overview: 4
Prerequisites: 4
p. 2
Overview:
The Administrative Console of FlexID can be configured using a Custom OIDC Provider to use
different Login Methods. This guide explains how to use an external IDP, for example, Azure AD, for
administrative users.
Prerequisites:
● A working FlexID instance
● An Azure AD directory and an administrative user with permissions to:
o Register an application
o Create groups
p. 3
Configure the Application
p. 4
3. As per below diagram,
● Add the following Redirect URI:
“https://<TSSERVER>/oidc-login-callback”.
● and ensure the ID tokens (used for implicit and hybrid flows) flow is enabled.
Repeat same step to add the redirect url for OIDC debugger (https://oidcdebugger.com/debug) to validate the
application individually
p. 5
4. Access Manage > Certificates & Secrets and click “New client secret” to generate a new
client secret. Make sure to save the secret value in a secure location for future use and also
the expiration of this client secret is given enough time.
p. 6
5. Access Manage > Token configuration and click “Add groups claim” to add the groups as
optional claims. Select group type as “Groups assigned to the application” and select
sAMAccountName as ID and Access token properties.
p. 7
6. Create the group, or groups, that will have access to the FlexID Console.
7. Add at least one member to this group (you need the username and password of this
member)
8. Access Enterprise applications > TransmitConsole and search groups to assign to this
application
p. 8
Gather Information
1. Access Overview and copy the Application (client) ID value for future use.
2. Access Overview > Endpoints and open the URL specified in OpenID Connect metadata
document
p. 9
3. From the above page gather all the relevant URLs to configure the IDP on the Transmit
console.
○ Issuer (issuer)
○ Authorization Endpoint URL (authorization_endpoint)
○ Token Endpoint URL (token_endpoint)
○ UserInfo Endpoint URL (userinfo_endpoint)
○ JWKS URL (jwks_uri)
p. 10
3. Login as a user who is a member of the Admin group previously defined.
p. 11
4. If you don’t receive a Success! message, review your app/oidc-debugger configuration.
p. 12
Configure the FlexID Console
After verifying the external IDP is delivering the needed information and that the data is correct,
you can configure the Flex ID console to use it.
Create Credentials
p. 13
2. Create the credentials with the following information:
○ ID: <Client ID>
○ Secret: <Secret value (created in step 2 of Configure the Application)>
p. 14
p. 15
4. Restart the server and Register the Group ID as an allowed administrator (configure
permissions as needed).
p. 16
Restart the Console
Result:
When you log into the console, you will be asked to login via the configured IDP.
p. 17