Universal Policy Administrator Documentation
Configuring OIDC Authentication with Microsoft Entra ID
- Install the UPA Gatekeeper/Gateway.
- Create and configure UPA as an enterprise application in your Microsoft Entra ID tenant:
- Sign in to the Microsoft Entra admin center:
- From the left navigation pane, select Enterprise apps > All applications
- Select New application
- On the Browse Microsoft Entra Gallery page, select Create your own application
- Enter a name for your application. For example, ‘UPA_OIDC’
- Select Integrate any other application you don’t find in the gallery (Nongallery)
- Click Create
- Assign Users and Groups:
- On your application’s Overview page, select Assign users and groups from the Identity menu or the Getting Started area
- Select Add user /group on the Users and groups page
- On the Users and groups tab of the Add Assignment page, select one or more Users and Groups check boxes
- Click Select
- On the Select a role tab of the Add Assignment page, select a role
- Click Select
- Click Assign
- (Optional) On the Users and groups page, select a User or Group
- (Optional) Select Edit Assignment to assign a different role
- (Optional) Select Remove Assignment to remove assigned users and groups
- Configure Application Authentication:
- Navigate to the Microsoft Entra admin center
- From the left navigation pane, select App registrations > All applications
- Select your application created in a previous step and make a note of the following values:
- Application (client) ID
- Directory (tenant) ID
- Click Endpoints and copy the OpenID Connect metadata document URL
- Select Authentication, from the Manage area
- Select Add a Platform
- Select Web from the Configure platforms area
- Enter the Redirect URI in format: https://<gatekeeper>/Portal/SSO/OIDC>
- Click Configure
- Enter the Front Channel Logout URL in format: https://<gatekeeper>/Portal/SSO/Logout>
- Select the ID tokens checkbox
- Click Save
- Configure UPA to use OIDC authentication.
- In the Full Armor UPA Owner Portal (https://<gatekeeper>/portal/account), select SSO
- Click Add OIDC Provider to launch the Edit OIDC Configuration page and complete the following steps
- Enter the identify provider as the Provider Name
- Select the Set as Default Login Provider check box
- In the Provisioning Mode list, click AutomaticProvisioning
- Click Configure Provisioning to launch the Provisioning Settings page
- View the Provider Name
- View the Provisioning Mode
- Click Get SCIM Token
- Click Configure Claims Mappings to launch the Claims Mappings page:
- In the Match login claims to users using this property list, click EmailAddress
- Enter preferred_username as the Unique ID
- Enter preferred_username as the Username
- Enter name as the Display Name
- Enter email as the Email Address
- You might leave Groups blank
- You might leave Domain\username blank
- You might leave SID blank
- You might leave IP Address blank
- Click Save
- Enter the OpenID Connect metadata document URL noted in a previous step
- Enter the Client ID noted in a previous step
- In the Match on Property list, click EmailAddress
- Enter tenancyId as Parameter 1 Name
- Enter directory (tenant) Id as Parameter 1 Value
- Enter scope as Parameter 2 Name
- Enter openid email as Parameter 2 Value
- Click Save Changes
- Sign in to the Microsoft Entra admin center:
- Configure SCIM provisioning in the Microsoft Entra admin center:
- Navigate to the Microsoft Entra admin center
- From the left navigation pane, go to Enterprise apps
- On your application’s Overview page, select Provisioning
- On your application’s Provisioning page, select Provisioning again
- In the Provisioning Mode list, click Automatic
- In the Admin Credentials section:
- Enter the Tenant URL of the SCIM endpoint https://<gatekeeper>/api/scim>
- Paste the Secret Token retrieved in a previous step
- Click Test Connection to verify
- In the Settings section:
- Select to Send an email notification when a failure occurs Notification Email
- Select to Prevent accidental deletion Accidental deletion threshold
- Click Save
- Click Start Provisioning and allow time for the initial provisioning cycle to complete
- Check the provisioning status in the Microsoft Entra admin center
- Assign UPA Global Administrator role:
- On the UPA Owner Portal, click the SSO tab when provisioning is complete
- Select the List Users button for the OIDC provider
- Confirm that the users/ groups are imported correctly
- Select the user to grant global administrator permissions
- Click Set User as Global Admin
For more information, see Add an OpenID Connect-based single sign-on application in Microsoft Entra ID.
