Configuring OIDC Single Sign-on
Register a new application in Azure
- Access Azure portal and sign in.
- On the home page, select
Microsoft Entra ID
underAzure services
.

- Select
App registrations
underManage
section on the left sidebar, then click onNew registration
on the top menu bar.

- In
Register an application
page, fill in the name for the new application, using MDCore-OIDC as an example, and clickRegister
to complete.

- Select
Token configuration
in the left sidebar, hitAdd optional claim
, chooseID
on the right sidebar, enable essential claims (given_name in this example) and clickAdd
at the bottom.

- Click
Add
on the popup to finish.

Enabled claims will be used later by MetaDefender Core to identify logged-in user.
Create OIDC directory in MetaDefender Core
- Sign in to MetaDefender Core.
- At the dashboard, click
User Management
in the left sidebar. - In
User Management
page, chooseDirectories
tab and clickAdd directory
on the top right corner.

- In
Add Directory
page, choose OIDC inDirectory type
. - Fill in the name the new directory, such as MDCore-OIDC.
- In
Service Provider
section, fill inHost or IP
with the host or IP address where MetaDefender Core is hosted; for this example, it is https://localhost:8008. - Copy the
Login URL
and store it somewhere for later use.

Complete configuration in Entra ID
- Back to Microsoft Entra ID, on
MDCore-OIDC
page, selectOverview
section in the left sidebar and click onAdd a Redirect URI
link to switch toAuthentication
page.

- In
Authentication
page, clickAdd a platform
and chooseWeb
option in the right sidebar.

- Fill in
Redirect URIs
field with theLogin URL
copied from MDCore, enableAccess tokens
option and clickConfigure
.

- Select
Overview
in the left sidebar again, copy the string next toApplication (client) ID
and store as client_id.

- Click
Endpoints
in the top bar, copy the URI underOpenID Connect metadata document
in the right sidebar and store it as metadata_uri.

- Select
Certificates & secrets
in the left sidebar, go toClient secrets (0)
tab, clickNew client secret
, fill in the secret description and set expiration and, then clickAdd
to complete.

- A new client secret is created under
Client secret (1)
tab; copy the string underValue
column and store it as client_secret.

Entra ID will hide the client secret completely when page Certificate & secrets
is left. Administrator is recommended to store the client secret in a safe place, otherwise they have to create a new one.
Complete configuration in MetaDefender Core
- Switch back to MetaDefender Core. Under
Identity Provider
section, clickFetch URL
and paste metadata_uri gathered in Configure Azure stage into the box underFetch URL
. ClickOK
and wait a moment for MetaDefender Core to set Microsoft Entra ID as its IDP.

- Under
Service Provider
section, paste client_id and client_secret gathered in Configure Azure stage toClient ID
andClient secret
respectively.

- Fill user identity under
User identified by
, ${given_name} is used in this example. - Select
Default role
option and select correct role for the user underUser Role
- Click
Add
to complete the settings.

- In
User Management
screen of MetaDefender Core, toggle MDCORE-OIDC directory. A dialog box appears to confirm the action. OnceEnable
is clicked , all sessions expire immediately.

Test the integration
- At the home screen of MetaDefender Core, click
Login
; the user is redirected to Microsoft Entra ID sign-in page.

- Sign in using the account registered with Microsoft Entra ID.
- If everything goes correctly, MetaDefender Core dashboard is displayed with user's identity shown in the top right corner.

- Otherwise, access backup login page at
<mdcore-host>#/public/backuplogin
for trouble shooting.
Was this page helpful?