Configuring OIDC Single Sign-on
Create OIDC directory in MetaDefender Core
- Sign in to MetaDefender Core.
- In the dashboard, click on
User Management
in the left sidebar. - On
User Management
page, selectDirectories
tab and clickAdd Directory
in the top right corner.

- In
Add Directory
page, select OIDC asDirectory type
, and enter a name for the new directory, such as MDCore-OIDC. - Enter
Host or IP
where MetaDefender Core is hosted, for this example use https://127.0.0.1:8008. - Copy the string generated under
Login URL
and store it as reply_uri.

Create and configure OIDC application in PingOne
- In the PingOne Overview page, navigate to
Connections
on the sidebar.

- Click the plus button to add a new application.

- Enter the application name, MDCore-OIDC as an example, choose
OIDC Web App
forApplication Type
, and clickSave
.

- Select
Configuration
tab, then click Edit button.

- In
Edit Configuration
page, navigate toRedirect URIs
, paste redirect_uri into the box below, and then clickSave
.

- Back in
Configuration
tab, navigate toOIDC Discovery Endpoint
, copy the link below, and save it as metadata_url.

- Expand
General
section, navigate toClient ID
andClient Secret
, and copy and save them as client_id and client_secret, respectively.

- Select
Attribute Mappings
tab and click Edit button.

- In
Edit Attribute Mappings
page, clickAdd
to create a new mapping.

In this step, we create a mapping from the key name used by MetaDefender Core to the one exported by PingOne. For example, we set given_name
mapped to Given Name
from PingOne. Later, given_name
is utilized by MetaDefender Core to identify the logged-in user.
- Enter the attribute name,
given_name
in this example, select the itemGiven Name
inPingOne Mappings
, enableRequired
option , and clickSave
to complete.

- Enable the new application in PingOne.

Complete configuration in MetaDefender Core
- Switch back to MetaDefender Core. Under
Identity Provider
, clickFetch URL
, paste value of metadata_url into the box below, clickOK
, and wait a moment for MetaDefender Core to check and set PingOne as its IdP.

- Under
Service Provider
, paste the values of client_id and client_secret into the boxes labeledClient ID
andClient Secret
, respectively. - Fill in ${given_name} in the box under
User Identified By
. - Select
Default role
option, choose the appropriate role to assign to users underUser Role
, and clickAdd
to complete the settings in MetaDefender Core.

- On
User Management
page, toggle the new directory, MDCORE-OIDC in this example. A dialog box will appear to confirm the action. OnceEnable
is clicked, all sessions will expire immediately.

Test the integration
- On the home screen of MetaDefender Core, click
Login
; the user is redirected to PingIdentity login page.

- Sign in using the account registered with PingIdentity.
- If everything goes well, MetaDefender Core dashboard is displayed with the user identity in the top right corner.

- Otherwise, access backup login page at
<mdcore-host>#/public/backuplogin
for trouble shooting.
Was this page helpful?