Configuring OIDC Single Sign-on
After the integration is successfully set up, any modifications on Okta application could lead to the regeneration of the client secret, causing Okta to reject requests from MetaDefender Core due to a mismatch in the client secret. In this instance, the customer should copy the new secret from Okta and update Client secret field within Service Provider of MetaDefender Core with the new one.
Create Okta application
- Access https://www.okta.com/login/ and sign in.
- In the sidebar of dashboard, hit Applicationsto drop sub items down, then selectApplications.
- Click Create App Integration.

- In Sign-in method, selectOIDC - OpenID Connect. InApplication typechooseWeb Applicationand clickNext.

- Fill App name, MDCore-OIDC for example and clickNext.

Create OIDC directory in MetaDefender Core
- Sign in to MetaDefender Core management console.
- Under Dashboard, hitUser Managementin the sidebar.
- Under User Management, selectDirectoriestab and clickAdd directoryin the top right.

- In Add Directorypage, choose OIDC forDirectory Type.
- Fill Nameof the new directory, MDCore-OIDC for example.
- Under Service Provider, fill inHost or IPwhere MetaDefender Core is being hosted, https://localhost:8008 for this example.

Complete configuration in Okta
- Switch to Applicationsscreen in Okta home page.
- Paste the Login URLfrom MetaDefender Core intoSign-in redirect URIsand grant permission for everyone to access our application inAssignmentsthen clickSave.

- In Generaltab, copyClient IDandClient Secret.

Complete configuration in MetaDefender Core
- Switch to MetaDefender Core screen, under Identity Provider, click onFetch URL.
- OIDC link will be built by appending /.well-known/openid-configuration to your Okta domain url (Referred Okta document). For example dev-115662.okta.com/.well-known/openid-configuration.
- Paste OIDC configuration link above to the box under Fetch URLand hitOKto ensure MetaDefender Core can set Okta as its IdP.

- Under Service Provider, paste the value ofClient IDandClient secretthat you copied from Okta respectively.

- Under Service Provider, fill inUser identified bywith ${given_name}_${family_name} for example.
- Select appropriate role for the user under User Role.
- Click Addto complete the settings.

- On User Managementscreen, toggle the new directory, MDCORE-OIDC in this example. A dialog box is shown to confirm the action. OnceEnableis hit, all existing sessions will be expired immediately and Okta will be used to authenticate users going forward.

Test the integration
- Browse MetaDefender Core, hit Login, user is redirected to Okta's sign-in page.

- Sign in by the account registered in Okta.
- If everything goes right, MetaDefender Core dashboard is shown with user identity set at the top right corner.

- For troubleshooting, browse <mdcore-host>#/public/backuplogin.
