Configuring OIDC Single Sign-on
After the integration is successfully set up, any modifications on Okta application could lead to the regeneration of the client secret, causing Okta to reject requests from MetaDefender Core due to a mismatch in the client secret. In this instance, the customer should copy the new secret from Okta and update Client secret
field within Service Provider
of MetaDefender Core with the new one.
Create Okta application
- Access https://www.okta.com/login/ and sign in.
- In the sidebar of dashboard, hit
Applications
to drop sub items down, then selectApplications
. - Click
Create App Integration
.

- In
Sign-in method
, selectOIDC - OpenID Connect
. InApplication type
chooseWeb Application
and clickNext
.

- Fill
App name
, MDCore-OIDC for example and clickNext
.

Create OIDC directory in MetaDefender Core
- Sign in to MetaDefender Core management console.
- Under
Dashboard
, hitUser Management
in the sidebar. - Under
User Management
, selectDirectories
tab and clickAdd directory
in the top right.

- In
Add Directory
page, choose OIDC forDirectory Type
. - Fill
Name
of the new directory, MDCore-OIDC for example. - Under
Service Provider
, fill inHost or IP
where MetaDefender Core is being hosted, https://localhost:8008 for this example.

Complete configuration in Okta
- Switch to
Applications
screen in Okta home page. - Paste the
Login URL
from MetaDefender Core intoSign-in redirect URIs
and grant permission for everyone to access our application inAssignments
then clickSave
.

- In
General
tab, copyClient ID
andClient Secret
.

Complete configuration in MetaDefender Core
- Switch to MetaDefender Core screen, under
Identity Provider
, click onFetch URL
. - OIDC link will be built by appending /.well-known/openid-configuration to your Okta domain url (Referred Okta document). For example
dev-115662.okta.com/.well-known/openid-configuration
. - Paste OIDC configuration link above to the box under
Fetch URL
and hitOK
to ensure MetaDefender Core can set Okta as its IdP.

- Under
Service Provider
, paste the value ofClient ID
andClient secret
that you copied from Okta respectively.

- Under
Service Provider
, fill inUser identified by
with ${given_name}_${family_name} for example. - Select appropriate role for the user under
User Role
. - Click
Add
to complete the settings.

- On
User Management
screen, toggle the new directory, MDCORE-OIDC in this example. A dialog box is shown to confirm the action. OnceEnable
is hit, all existing sessions will be expired immediately and Okta will be used to authenticate users going forward.

Test the integration
- Browse MetaDefender Core, hit
Login
, user is redirected to Okta's sign-in page.

- Sign in by the account registered in Okta.
- If everything goes right, MetaDefender Core dashboard is shown with user identity set at the top right corner.

- For troubleshooting, browse
<mdcore-host>#/public/backuplogin
.
Was this page helpful?