Configure Single Sign-On
You can configure Single Sign-On (SSO) to the Adaptiva Admin Portal using SAML (Security Assertion Markup Language) or OIDC (OpenID Connect). This allows you to federate users and assign them roles in the Adaptiva Server.
Enable Single Sign-on using OIDC
Before enabling OIDC in the Admin Portal, verify that your IAM provider supports OpenID Connect and TLS is enabled (by default) on your Adaptiva server.
Create an App Registration in Microsoft Entra
Create an App Registration for the Adaptiva Server to use for federation with Entra ID.
Log in to the Microsoft Entra admin center as a Global Admin or a delegate with App Registration permissions.
In the Search bar, enter App Registrations, and then select App registrations from results.
Select New Registration.

Enter a Name for the application.

Select the appropriate setting in the Supported account types section. Typically, you would select Accounts in this organizational directory only.
From the Select a platform drop-down, select either Web (build 9.3 or later) or Single-page application (SPA) (build 9.1 or 9.2).
Enter the URL as shown in the following example:
https://AdaptivaServerFQDN[:port]/login/oidc-redirect.The
AdaptivaServerFQDN[:port]is the name and port used to log in to the Adaptiva Server. For example, "https://cm.onelab.com:9678/login/oidc-redirect".Click Register.
If your Adaptiva Server is using build 9.1 or 9.2, add another URI:
a. Select the Redirect URIs link from the Overview page.
b. Click Add URI.
c. Enter your URL into the respective field using the following format:
https://AdaptivaServerFQDN[:port]/login/oidc-redirect/registrationd. Select Save.
If the server is accessed using any other names besides the FQDN, create the pair of URIs for each name that you use.
Click Register.
Create a Client Secret (build 9.3 or later)
If your Adaptiva Server is using build 9.3 or later, create a client secret for authentication to Entra ID.
Select Certificates & Secrets on the far-left action pane.
Select + New client secret, under Client secrets on the Clients & secrets page:

Enter a description in the Description field on the Add a client secret dialog, and then select the appropriate expiration timeframe based on the security guidelines of your company.

Select Add to return to the Clients & secrets page.

Record the value of the secret to use in the Adaptiva Server. This secret value never displays again after you leave this page.
Select Overview in the left-side pane.

Record the Application (client) ID and the Directory (tenant) ID.
Create an OIDC Provider
Create and configure an OIDC Provider on the Adaptiva Server using the App Registration information you recorded in the previous steps.
Log in to the Adaptiva Server as a Super Admin user.
Select the gear
in the upper right, and then navigate to Settings > Security > OIDC Providers.
Select +New to open a new OIDC Providers template, and then configure the following General Settings:
a. Enter a Name (such as Entra ID or Okta ID) for the OIDC Provider, and then add a detailed Description.
b. (Optional) Add a logo for the OIDC provider.
Scroll down to OIDC Settings and add the details provided by the Global Admin:

Enter the Tenant URL in the Authority field using the following format:
https://login.microsoftonline.com/<tenantID>/v2.0.The
<tenantID>is the Directory (tenant) ID you recorded earlier.Enter the Application (client ID) your recorded earlier in the Client ID field.
If your Adaptiva Server is using build 9.3 or later, add the Client Secret that you received from the Azure Global Admin:
a. Click the Client Authentication Type from the dropdown menu, and select Client Secret (Post).
b. Enter the Client Secret into the respective field. This is the Client secret (value) you recorded earlier.
c. Click Save.
Create new Administrator account
After creating the OIDC Provider, register users as Administrators using the following steps:
Log in to the Admin Portal as a Super Admin.
Select the
> Settings > Security > Administrators.Click +New and create an Administrator account.
Select the Admin Type dropdown menu, and select OpenID Connect.
Enter the email address for the user you are creating. The uses this address to send an email invitation to the user, and to match the user with their IAM service identity.
Click the Identity Provider drop-down and select the provider you created earlier.
Enter the first and last name of the user in the User Details section and add any additional information as needed.
Select Save.
Select the More dropdown and click Invite to send an invitation email to the user. Refer to the account activation for information on what the invite user will see.
Register new account
After receiving the invitation email, the user can complete the account registration using the following steps:
Select Register Account in the email. This takes the user to the IAM service login page.

Open a new session of the Admin Portal. The login screen now lists the new OIDC Provider.

Select the new login selection to log into the portal using your IAM credentials.
Updating your OIDC Configuration After Upgrading to Build 9.3
If you have upgraded to build 9.3 or later and have already configured OIDC, the following steps must be completed by the Azure Global Admin or a delegate to update your configuration.
Update the App Registration
Log in to the Azure Portal as a Global Administrator or with rights for App Registrations.
Select App registrations.
Locate and select the App Registration created for the Adaptiva Server.
Select Authentication.
Click the trash can icon
on the upper-right of the Single-page application section to delete all Redirect URIs.
Select Delete to confirm the deletion.
Create a Platform Configuration
Select + Add a platform.
Select Web.
Enter the following URI in the Redirect URI field:
https://AdaptivaServerFQDN[:port]/login/oidc-redirectSelect Configure.
Create a Client Secret
Follow the earlier steps to create a client secret.
Update the OIDC Configuration
The following steps must be completed by the Adaptiva Administrator.
Log in to the Adaptiva Admin Portal.
Navigate to
> Security > OIDC Providers.Select the OIDC Provider that you created.
Select the Client Authentication Type in the OIDC Settings section, and then select Client Secret (Post).
Enter the Secret you received from the Azure Global Admin into the Client Secret field. The Show Secret button appears after you enter the Secret into the Client Secret field.
Select Save.
Last updated
Was this helpful?