OpenID provider examples
Introduction to OpenID providers
An OpenID provider is a service that authenticates users and provides information about them to other services. In this guide, we will show you how to obtain the necessary information from some common OpenID providers.
Microsoft Entra as identity provider
OpenID configuration in Microsoft Entra
The following is an example and may be subject to change. For the most recent information, see the Microsoft documentation.
-
To register an application:
- Navigate to the Microsoft Entra (formerly: Azure AD) portal.
- Go to Identity > Applications > App registrations.
- Select New registration and register a new application.
-
Go to the Overview section of the registered application to view the Application (client) ID.
-
To generate a client secret:
- Go to the Certificates & secrets section.
- Under Client secrets, click on New client secret to generate a new secret.
- Note down the value of the client secret as it will not be displayed again.
-
In the Overview section, select Endpoints to view the OpenID Connect metadata document. The metadata endpoint is usually constructed as
https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration
. Replace{tenant}
with your directory (tenant) ID or your domain name. For more information, see:
Microsoft Entra endpoints
Indicium main administratorWithout user provisioning, users are not automatically created in IAM when they log in for the first time. In that case, make sure that the Microsoft account that tries to log in is already available in IAM, or Indicium will not accept the authentication.
Microsoft Entra uses the concept of tenants. A tenant is a dedicated instance that represents an organization. A tenant is uniquely identified by a GUID.
Aside from each company-specific tenant identified by a GUID, Microsoft defines the following global tenants:
consumers
- An alias for Microsoft's own tenant GUID. You can see this as Microsoft's own Active Directory containing all personal Microsoft accounts.organizations
- An alias for all company-specific tenants together. The authenticated user can come from any tenant that is not known in advance.common
- Organizations and consumers. This tenant can contain all Microsoft accounts. The authenticated user can come from any tenant that is not known in advance.
To add a metadata endpoint for an OpenID provider in IAM:
Authorization > OpenID providers > tab Form
- Enter an endpoint in the field Metadata endpoint.
- If you are using a global tenant instead of a GUID reference to a tenant: select if you want to allow everyone to log in or only users that are known to your organization. See Allow everyone to log in and Limit who can log in.
Endpoint examples
-
To allow only users from your own, singular, Microsoft Entra tenant, use the
GUID
reference to your tenant. Example:https://login.microsoftonline.com/00000000-0000-0000-0000-000000000000/v2.0/.well-known/openid-configuration
Replace
000000000-0000-0000-0000-0000000000
with the GUID reference of your tenant. -
To allow all Microsoft accounts (work and personal) to sign in, use the
common
tenant. In addition, select the Allow all issuers checkbox (see Allow everyone to log in). Example:https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration
-
To allow any Microsoft work account, use the
organizations
tenant. In addition, select the Allow all issuers or Allow additional users checkbox (see Allow everyone to log in and Limit who can log in). Example:https://login.microsoftonline.com/organizations/v2.0/.well-known/openid-configuration
-
To enable users to sign in with any Microsoft personal account, use the
consumers
tenant. In addition, select the Allow all issuers checkbox (see Allow everyone to log in). Example:https://login.microsoftonline.com/consumers/v2.0/.well-known/openid-configuration
Trusted IP's to bypass 2FA
When using Microsoft as an OpenID provider, you can set trusted IP ranges to bypass two-factor authentication in on-premise environments. So, when working at the office, users will not be prompted for two-factor authentication.
For more information, see the Microsoft documentation on Trusted IPs.
Google Identity Platform as identity provider
OpenID configuration in Google
The following is an example and may be subject to change. For the most recent information, see the Google documentation.
-
To register an application:
- Navigate to the Google Cloud Platform.
- Go to APIs & Services > Credentials.
- Click on Create credentials and register a new OAuth client ID.
-
To obtain the Client ID, go to the OAuth 2.0 Client IDs section in the Credentials page.
-
Alongside the Client ID, a Client Secret is generated. You can view and manage your client secrets under the Credentials section.
-
The metadata endpoint is usually constructed as
https://accounts.google.com/.well-known/openid-configuration
. You can enter this URL in the Metadata endpoint field in IAM.