The following example shows the configuration of an identity provider with Microsoft Entra ID. The illustrations of Microsoft Entra ID correspond to the software version when this user guide was created.
Prerequisite
Identity Provider Manager and Group Mapper Manager role
Procedure
The Azure Active Directory overview is displayed.
A new application is created and opened.
The client secret key can only be copied once at this time. Subsequent copying is no longer possible.
OpenID Connect is configured by default with Nexeed Multitenant Access Control.
Select groups/roles that should be part of the tokens issued during login.
The selection of Groups assigned to the application assumes that relevant groups are explicitly assigned to the application and the consequence of this is that the group hierarchy cannot be used.
If the application is not subsequently given the necessary permissions for Microsoft Graph, do not add all existing groups to a token. Otherwise, once 200 or more groups are assigned to the user, they will not all be available.
Do not add all existing groups to a token without configuring the login_hint claim. A large token with more than 10 kB can otherwise lead to problems during logout.
You can send either the Group ID or SAML in a token. The extended entitlement to group assignment must be used accordingly.
The group is assigned to the application.
I
This ensures that the claim is checked each time the token is logged in and the assignment to the mapped group is executed again and updated.
All users assigned to the user group stored with the identity provider can log in to Nexeed Industrial Application Systems centrally via the identity provider.