Setting up Microsoft Entra for OIDC-based Single Sign-On (SSO)
Who is this article for?
Administrators responsible for managing organization security settings in Ideagen Hub.
Admin Console access is required.
You can set up Microsoft Entra as your corporate identity provider (IdP) in Ideagen Hub using SAML or OIDC. To use an external identity provider like Microsoft Entra, you will need to ensure the Hub user's authentication type is set to External.
This article outlines how to configure a new OIDC app in Microsoft Entra and link it to Ideagen Hub.
1. Creating an OIDC app
To create an OIDC app in Microsoft Entra:
- Log in to to the Entra portal.
- Navigate to App registrations.
-
Click New registration to create a new app.
2. Configuring the OIDC app
To configure your OIDC IDP in Ideagen Hub:
- Sign in to Ideagen Hub.
- Navigate to the Admin Console.
- Go to the Security Center.
- Select Authentication.
- Select Eternal IDP Configuration.
- Click Add Identity Provider.
- Select OIDC.
- Click Next.
- Enter a Provider name. This name will appear as the sign-in button label at the sign-in page.
- Complete the remaining mandatory settings based on instructions in the sub-sections below, then click Apply Configuration save the IDP configuration in Ideagen Hub.
2.1. Client ID and Client Secret
You will need a client ID and secret when setting up the OIDC IdP in Ideagen Hub.
2.1.1. Microsoft Entra
To obtain the client ID and secret from the Microsoft Entra app you created:
- Once the App is created, you can copy the Application (Client) ID.
This is the Client ID to be configured in Ideagen Hub.
- Go to Certificates & secrets.
- Click New client secret.
- Enter a meaningful Description.
- Set the Expiry time according to your company policies.
- Once created, copy the Value.
This is the Client Secret to be configured in Ideagen Hub.
2.1.2. Ideagen Hub
To configure the Client ID and Client in Ideagen Hub:
- Go to the OIDC Configuration screen.
- Enter the Client ID and Client secret you have retrieved from Microsoft Entra.
2.2. Redirect URL
The Redirect URL for Ideagen Hub needs to be added to the Micrsoft Entra app.
2.2.1. Ideagen Hub
In Ideagen Hub, copy the Redirect URL displayed at the top of the OIDC Configuration screen.
2.2.2. Microsoft Entra
To set up the Redirect URL in Microsoft Entra:
- Navigate to Overview.
- Open the Manage menu.
- Select Authentication (Preview).
- Click Add Redirect URI.
- Select Web.
- Paste the Redirect URI copied from Ideagen Hub.
- Click Configure.
2.3. Authorized scope
In Ideagen Hub, you will need to configure the required authorized scope. Ideagen Hub only populates openid by default. You will need to populate the additional scope as required, separated with spaces.
Refer to this page ID token claims reference - Microsoft identity platform for information on the scope required for each claim.
For example, you will need to add:
- profile scope to use the preferred_username claim
- email scope to use the email claim
- profile scope to use the name claim.
2.4. Attribute request method
In Ideagen Hub, select one of the methods for the attribute request method. For example, GET. Both GET and POST methods should be supported by Microsoft Entra.
2.5. Issuer URL
2.5.1. Microsoft Entra
To retrieve the Issuer URL from Microsoft Entra:
- Navigate to Overview.
- Go to Endpoints.
- Get the OpenID Connect metadata document URL.
- Open the metadata document using a web browser.
- Copy the Issuer URL.
2.5.2. Ideagen Hub
To set up the Issuer URL in Ideagen Hub:
- Go to the OIDC Configuration screen.
- Select Auto fill through issuer URL.
- Paste the Issuer URL obtained from Microsoft Entra.
3. Configuring attribute mapping
In most cases, you will be required to map both the email and preferred_username values in Ideagen Hub.
3.1. Email attribute
In Ideagen Hub, on the OIDC Configuration screen, you will always see email listed as a fixed User pool attribute that you need to map. By default, Microsoft Entra ID's Enterprise Application includes a pre-configured claim named email that is mapped to user.mail.
To set up the email attribute in Ideagen Hub, enter email as the OpenID Connect attribute next to the email User pool attribute.
3.2. Username attribute
In Ideagen Hub, on the OIDC Configuration screen, if you see preferred_username listed as a fixed User pool attribute that you need to map, ensure it is mapped to an attribute from your IdP that contains a unique and consistent identifier for each user.
3.2.1. Pre-configured claim
By default, Microsoft Entra ID's Enterprise Application includes a pre-configured claim named preferred_username mapped to user.userprincipalname. Assuming that user.userprincipalname contains a unique value for each user, you can copy the default claim name to be mapped to the preferred_username attribute in Ideagen Hub.
Note
If you are using preferred_username, you will need to ensure that the Username value created/imported in Ideagen Hub user management is consistent with the value returned from preferred_username, which follows the format of user@domain.com.
3.2.3. Custom claim
You can also use any other unique value that is not included in the default claims provided by Microsoft Entra as the preferred username.
For example, if your organisation uses Employee ID as a unique identifier, you can create a custom claim to map Microsoft Entra's Employee ID to the preferred_username user pool attribute in Ideagen Hub.
To create a new claim:
Go to the application in the Entra portal.
Navigate to Overview.
Click Manage applicationi n local directory.
Open the Manage menu.
Select Single sign-on.
Click Edit next to Attributes & Claims.
Click Add New claim.
Enter a Name for the claim.
Ensure you select a Source attribute that will return the user's email address (e.g., user.employeeid).
-
Click Save.
After adding the new attribute, configure the application to permit these changes. For a single-tenant app, like ours, the easiest method is to update the application manifest to recognise the modified claims.
To use this custom claim, copy its claim name. This value will be used later to map to the preferred_username user pool attribute in Ideagen Hub.
If you are using employee_id, make sure that the Username value created or imported in Ideagen Hub user management matches the value returned from employee_id. You can verify this in Microsoft Entra.