Create OIDC Provider
You can only configure single sign-on (SSO) in an on-premises Adaptiva Server. This does not apply to our SaaS solution.
You can configure Single Sign-On (SSO) to the Adaptiva Admin Portal using OIDC (OpenID Connect). This allows you to federate users and assign them roles in the Adaptiva Server.
Below are some OIDC Provider specific guides:
Enable Single Sign-on using OIDC
Before enabling OIDC in the Admin Portal, verify that your IAM provider supports OpenID Connect and TLS is enabled (by default) on your Adaptiva server.
Log in to the Adaptiva Server as a Super Admin user.
Select the gear
in the upper right, and then navigate to Settings > Security > OIDC Providers.
Select +New to open a new OIDC Providers settings page, and then configure the following General Settings:
Enter a Name (such as Entra ID or Okta ID) for the OIDC Provider, and then add a detailed Description.
(Optional) Add a logo for the OIDC provider.
Scroll down to OIDC Settings and add the details provided by the OIDC Provider (Entra, Okta, DUO):

Authority - The base URI provided by the OIDC provider.
Client ID - The client ID given to the Adaptiva server when registered with the provider.
Client Authentication Type - The type of client authentication the Adaptiva server should send to the identity provider when requesting ID Tokens.
None - Select none if you are using build 9.2 or earlier.
If your Adaptiva Server is using build 9.3 or later, add the Client Secret that you received from the Identity Management administrator:
Private key (JWT)
Client Secret (JWT)
Client Secret (Post)
Enter the Client Secret into the respective field.
Client Secret - The client secret used by Adaptiva server to authenticate with OIDC provider.
Click Save.
Create new Administrator account
After creating the OIDC Provider, register users as Administrators using the following steps:
Log in to the Admin Portal as a Super Admin.
Select the
> Settings > Security > Administrators.Click +New and create an Administrator account.
Select the Admin Type dropdown menu, and select OpenID Connect.
Enter the email address for the user you are creating. The system uses this address to send an email invitation to the user, and to match the user with their IAM service identity.
Click the Identity Provider drop-down and select the provider (Entra, Okta, DUO).
Enter the first and last name of the user in the User Details section and add any additional information as needed.
In the Direct Roles section, click Browse. Select the appropriate role(s) for the administrator and click OK.
Select Save.
Select the More dropdown and click Invite to send an invitation email to the user. Refer to the account activation for information on what the invite user will see. If they do not accept the invitation in 24 hours, you will need to send a new invite.
Register new account
After receiving the invitation email, the user can complete the account registration using the following steps:
Select Register Account in the email. This takes the user to the IAM service login page.

If the user is not already logged in, the IAM prompts them to log in.
Open a new session of the Admin Portal. The login screen now lists the new OIDC Provider.

Select the new login selection to log into the portal using your IAM credentials.
Last updated
Was this helpful?