Skip to main content
Skip table of contents

How to Set Up UMS Login with SSO

You can use the following Identity Providers (IdPs) to access the Unified Management Suite (UMS):

Each IdP requires specific configurations and role mappings to facilitate seamless user authentication and authorization within the UMS.

Basically, setting up an IdP for the UMS involves 4 steps:

  1. Create an application in your Cloud IDP

  2. Set up users and groups resp. app roles in your Cloud IDP

  3. Configure your IDP connection in the UMS Console

  4. Map IDP roles to UMS groups

The steps are described in general terms below; your mileage, including the exact wording of concepts like “client id”, may vary depending on the IdP you are using.

Prerequisites

  • Users and groups with the appropriate permissions are already configured in your UMS

UMS Login with Microsoft Entra ID

Creating an Application in Microsoft Entra ID

  1. Log in to the Microsoft Entra ID portal and click Add application registration.

image-20250523-111637.png

  1. Enter a Name for this application. It is recommended to use a descriptive name, as this name is user-facing. Afterward, click Register.

image-20250523-112017.png

The essential data for your application is displayed.

  1. From the field Application (client) ID, copy the application ID, also referred to as the client ID.

image-20250523-112818.png

  1. To open the menu for secret creation, click Add a certificate or secret.

image-20250523-113208.png

  1. Click New client secret.

image-20250523-114048.png

  1. Add a description and an expiry date for your secret and click Add.

image-20250523-114642.png

  1. Copy the secret’s Value immediately before you leave the current page.

You must copy the secret immediately because it will not be visible after leaving this page.

image-20250523-115142.png

  1. Go back to the Overview and click Endpoints.

image-20250523-123242.png
image-20250523-123438.png

The window Endpoints opens.

  1. Open the URL of the OpenID Connect metadata document in a new browser tab.

image-20250523-130431.png

The JSON document is displayed in the new browser tab.

  1. Copy the URL for the key “issuer” from the document.

image-20250527-054203.png

Configuring Your Connection to Microsoft Entra ID in the UMS Web App

  1. Open the UMS Web App, go to User Management, and click image-20250523-134713.png.

image-20250523-134843.png

  1. Enter the following data from the application you have created in Microsoft Entra ID and click Discover.

    • Display name: The name of your application

    • Issuer URI: The value of “issuer” you have copied from the OpenID Connect metadata document.

    • Client ID: The application ID or client ID for your application

    • Client secret: The secret you have created for your application

image-20250523-140155.png

  1. In the Identify Provider Configuration Details window, copy the Redirect URI and close the window.

image-20250523-143230.png

Configuring the Redirect URIs of the UMS in Microsoft Entra ID

We must configure the redirect URI for every base URL the end user will use.

  1. In Microsoft Entra, go to the Overview page and click Add a Redirect URI.

image-20250523-145843.png

  1. Click Add a platform.

image-20250523-150142.png

  1. Select Web.

image-20250523-150347.png

  1. In the Redirect URI you have copied from your UMS, replace {baseUrl} with the actual IP address and port of your UMS, and enter it. Example: https://123.123.123.111:8443/auth-service/login/oauth2/code/9ad85dd8-9372-5d11-1966-abe5f1365e58. Afterward, click Configure.

image-20250604-133726.png

The configured redirect URI is shown.

  1. Click Add URI to enter the other redirect URI for your UMS. All URIs that can be used for login must be added here, according to the following patterns:

    • IP address of the UMS Server: https://<IP ADDRESS>:8443/auth-service/login/oauth2/code/<REGISTRATION ID> - example: https://123.123.123.123:8443/auth-service/login/oauth2/code/ik45379f-ea33-413c-ed06-649f52d1a64d

    • FQDN of the UMS Server: https://<FQDN>:8443/auth-service/login/oauth2/code/<REGISTRATION ID> - example: https://myums.example.com:8443/auth-service/login/oauth2/code/ik45379f-ea33-413c-ed06-649f52d1a64d

    • Short name of the UMS Server: https://<SHORT NAME>:8443/auth-service/login/oauth2/code/<REGISTRATION ID> - example: https://myums:8443/auth-service/login/oauth2/code/ik45379f-ea33-413c-ed06-649f52d1a64d

    • Local IP address: https://<LOCAL IP ADDRESS>:8443/auth-service/login/oauth2/code/<REGISTRATION ID> - example: https://127.0.0.1:8443/auth-service/login/oauth2/code/ik45379f-ea33-413c-ed06-649f52d1a64d

    • Local IP address (alternative): https://<LOCAL IP ADDRESS>:8443/auth-service/login/oauth2/code/<REGISTRATION ID> - example: https://127.0.1.1:8443/auth-service/login/oauth2/code/ik45379f-ea33-413c-ed06-649f52d1a64d

    • “localhost” (used when the Server field in the login dialog of the UMS Console is empty): https://localhost:8443/auth-service/login/oauth2/code/<REGISTRATION ID> - example: https://localhost:8443/auth-service/login/oauth2/code/ik45379f-ea33-413c-ed06-649f52d1a64d

  1. Click Save to save your redirect URIs.

image-20250604-135320.png

Configuring the Token

  1. In Microsoft Entra ID, go to Token configuration and click Add optional claim.

image-20250527-110859.png

  1. Select ID as the Token type and preferred_username as the Claim, and click Add.

image-20250527-112027.png

  1. Go to API permissions and click Microsoft Graph.

image-20250527-140405.png

  1. Select offline_access and click Update permissions. This permission is needed for refreshing the tokens.

image-20250611-075301.png

Configuring User Role Mapping in Microsoft Entra ID

  1. Go to App roles and click Create app role.

image-20250527-145946.png

  1. Provide the following data and click Apply.

    • Display name: Descriptive name for the app role

    • Allowed member types: Select Users/Groups.

    • Value: Name that will be included in the “roles” claim of the token that will identify a user

    • Description: Describes the app role

    • Do you want to enable this app role: Leave this enabled

image-20250527-152351.png

  1. From your tenant’s main page, go to Enterprise applications and select your application.

image-20250528-135222.png

  1. Click Assign users and groups.

image-20250528-135530.png

  1. Click Add user/group.

image-20250528-140943.png

  1. If an app role already exists, you must first select the role you want to add the user to: Under Select a role, click None Selected, select the appropriate role, click Select, and then Assign.

image-20250611-094531.png
image-20250611-094732.png
image-20250611-095155.png

  1. Under Users, click None Selected, search for the desired user, and then select the user.

image-20250528-141142.png
image-20250528-141448.png
image-20250528-141948.png

  1. Confirm the assignment with Assign.

image-20250528-143003.png

Mapping the Roles in Microsoft Entra to UMS Groups

  1. Open the UMS Web App, go to User Management, select image-20250528-150822.png, and click + Create.

image-20250528-145045.png

  1. Edit the settings as follows:

  • IDP Role name: The Value of the app role you have configured in Microsoft Entra ID. Please note that this value is case-sensitive.

  • Assign Group: The UMS group you want to map to the app role

image-20250528-152807.png

  1. Continue with Adapting the Mapped Role Claim for Microsoft Entra ID.

Adapting the Mapped Role Claim for Microsoft Entra ID

The roles/groups defined within the IdP must be mapped to the IdP roles within the UMS. This is done via the token that is exchanged during the login process. By default, the UMS maps the roles/groups contained in the token claim ums_roles to IdP roles in the UMS.

Since Microsoft Entra does not support custom claims, we must edit the claim, which is done in the configuration file.

  1. Open <INSTALLLATION PATH>/rmguiserver/conf/appconfig/application.yml (example for Windows: C:\Program Files\IGEL\RemoteManager\rmguiserver\conf\appconfig\application.yml; example for Linux: /opt/IGEL/RemoteManager/rmguiserver/conf/appconfig/application.yml) and edit it as follows:

CODE
igel:
  auth-service:
    idp: 
      claimNameRoles: roles
  client-cert-forwarding:
    enabled: false
    client-cert-forwarded-header: X-SSL-CERT

  1. Restart the UMS Server.

    • On Windows: Services > IGEL RMGUIServer

    • On Linux: sudo systemctl restart igel-ums-server

UMS Login with Okta

Creating an Application in Okta

  1. Log in to your Okta portal and navigate to Applications > Applications.

  1. Click Create App Integration.

image-20250603-151140.png

  1. Edit the settings as follows and click Next.

    • Set Sign-in method to OIDC - OpenID Connect.

    • Set the Application type to Web Application.

image-20250603-151306.png

  1. Under Assignments, select which users are allowed to access the application and save your application.

image-20250603-152529.png

  1. Save your application.

  1. Go to Security > API and copy the Issuer URI of your authorization server (typically default).

image-20250603-152657.png

  1. Open the General tab and copy the following data for your application:

    • Client ID

    • Client Secret

image-20250603-152810.png

Configuring User Role Mapping in Okta

For the following procedure, we assume that a group is already defined in Okta.

  1. In the Okta portal, go to Directory > Groups and add the relevant users to your group.

image-20250604-090748.png

  1. Switch to Security > API and edit your authorization server (typically default).

image-20250603-153109.png

  1. Open the tab Claims and add a new claim with the following settings:

    • Set the Name to “ums_roles”.

    • Set Include in token type to ID Token and Always.

    • Set Value type to Groups.

    • To assign your group to the claim, set Filter > Equals to the name of the group.

    • Use Include in to define the scopes. At least “openid” and “profile” should be selected.

image-20250603-153604.png
image-20250603-153708.png

Configuring Your Connection to Okta in the UMS Web App

  1. Open the UMS Web App, go to User Management, and click image-20250523-134713.png.

image-20250523-134843.png

  1. Enter the following data from the application you have created in Okta and click Discover.

    • Display name: The name of your application

    • Issuer URI: The issuer URI of your authentication server

    • Client ID: The client ID for your application

    • Client secret: The secret you have created for your application

image-20250603-144420.png

  1. In the Identify Provider Configuration Details window, copy the Redirect URI and close the window.

image-20250603-145026.png

Configuring the Redirect URL of the UMS in Okta

  1. In the Okta portal, go to Applications > Applications and open your application.

image-20250604-130045.png

  1. Select the tab General, scroll down to General Settings, and click Edit.

image-20250604-131709.png
image-20250604-131735.png

  1. In the section LOGIN, under Sign-in redirect URIs, enter the login URIs. All URIs that can be used for login must be added here, according to the following patterns:

    • IP address of the UMS Server: https://<IP ADDRESS>:8443/auth-service/login/oauth2/code/<REGISTRATION ID> - example: https://123.123.123.123:8443/auth-service/login/oauth2/code/ik45379f-ea33-413c-ed06-649f52d1a64d

    • FQDN of the UMS Server: https://<FQDN>:8443/auth-service/login/oauth2/code/<REGISTRATION ID> - example: https://myums.example.com:8443/auth-service/login/oauth2/code/ik45379f-ea33-413c-ed06-649f52d1a64d

    • Short name of the UMS Server: https://<SHORT NAME>:8443/auth-service/login/oauth2/code/<REGISTRATION ID> - example: https://myums:8443/auth-service/login/oauth2/code/ik45379f-ea33-413c-ed06-649f52d1a64d

    • Local IP address: https://<LOCAL IP ADDRESS>:8443/auth-service/login/oauth2/code/<REGISTRATION ID> - example: https://127.0.0.1:8443/auth-service/login/oauth2/code/ik45379f-ea33-413c-ed06-649f52d1a64d

    • “localhost” (used when the Server field in the login dialog of the UMS Console is empty): https://localhost:8443/auth-service/login/oauth2/code/<REGISTRATION ID> - example: https://localhost:8443/auth-service/login/oauth2/code/ik45379f-ea33-413c-ed06-649f52d1a64d

Mapping the Roles in Okta to UMS Groups

  1. Open the UMS Web App, go to User Management, select image-20250528-150822.png, and click + Create.

image-20250528-145045.png

  1. Edit the settings as follows:

  • IDP Role name: The Name of the app role you have configured in Okta. Please note that this value is case-sensitive.

  • Assign Group: The UMS group you want to map to the app role

image-20250604-142221.png

UMS Login with Ping Identity

Creating an Application in PingIdentity

  1. Log in to the PingIdentity portal, go to Applications > Applications, and click image-20250611-130205.png to create a new application.

image-20250612-054441.png

  1. Define an Application Name and select OIDC WebApp as the app type.

image-20250612-054717.png

  1. Go to Resources and select the following Allowed Scopes:

    • offline_access

    • openid

    • profile

image-20250612-054903.png

  1. Open the tab Overview, expand the connection details, and copy the Issuer URI.

image-20250612-060944.png

  1. From the section General, copy the following data:

    • Client ID

    • Client Secret

image-20250612-063858.png

Configuring User Role Mapping in PingIdentity

  1. Go to Directory > Groups and create a group.

image-20250612-064108.png

  1. Open the tab Users and add users to your group.

image-20250612-093058.png

  1. In your application, open the tab Attribute Mappings and map the attribute ums_roles to Group Names.

image-20250612-064300.png

Configuring Your Connection to PingIdentity in the UMS Web App

  1. Open the UMS Web App, go to User Management, and clickimage-20250523-134713.png.

image-20250523-134843.png

  1. Enter the following data from the application you have created in Okta and click Discover.

    • Display name: The name of your application

    • Issuer URI: The issuer URI of your authentication server

    • Client ID: The client ID for your application

    • Client secret: The secret you have created for your application

image-20250611-145257.png

  1. In the Identify Provider Configuration Details window, copy the Redirect URI and close the window.

image-20250611-145521.png

Configuring the Redirect URL of the UMS in PingIdentity

  1. In the PingIdentity portal, open the tab Configuration and clickimage-20250611-135351.png to edit.

image-20250612-065752.png

  1. Add all URIs that can be used for login, according to the following patterns:

    • IP address of the UMS Server: https://<IP ADDRESS>:8443/auth-service/login/oauth2/code/<REGISTRATION ID> - example: https://123.123.123.123:8443/auth-service/login/oauth2/code/ik45379f-ea33-413c-ed06-649f52d1a64d

    • FQDN of the UMS Server: https://<FQDN>:8443/auth-service/login/oauth2/code/<REGISTRATION ID> - example: https://myums.example.com:8443/auth-service/login/oauth2/code/ik45379f-ea33-413c-ed06-649f52d1a64d

    • Short name of the UMS Server: https://<SHORT NAME>:8443/auth-service/login/oauth2/code/<REGISTRATION ID> - example: https://myums:8443/auth-service/login/oauth2/code/ik45379f-ea33-413c-ed06-649f52d1a64d

    • Local IP address: https://<LOCAL IP ADDRESS>:8443/auth-service/login/oauth2/code/<REGISTRATION ID> - example: https://127.0.0.1:8443/auth-service/login/oauth2/code/ik45379f-ea33-413c-ed06-649f52d1a64d

    • “localhost” (used when the Server field in the login dialog of the UMS Console is empty): https://localhost:8443/auth-service/login/oauth2/code/<REGISTRATION ID> - example: https://localhost:8443/auth-service/login/oauth2/code/ik45379f-ea33-413c-ed06-649f52d1a64d

image-20250612-085947.png

If you allow Redirect URI patterns, you can add wildcards (e.g., for subdomains or registration ID)

image-20250612-091237.png

  1. Open the tab Overview and enable the application.

image-20250612-091413.png

Mapping the Roles in PingIdentity to UMS Groups

  1. Open the UMS Web App, go to User Management, select image-20250528-150822.png, and click + Create.

image-20250528-145045.png

  1. Edit the settings as follows:

  • IDP Role name: The name of the group you have configured in PingIdentity. Please note that this value is case-sensitive.

  • Assign Group: The UMS group you want to map to the app role

image-20250604-142221.png
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.