Identity Provider Configuration in IGEL UMS
You need to configure the Identity Provider (IdP) client and map IdP roles to user groups to enable Single Sign-On (SSO) for your IGEL Universal Management Suite (UMS). This article helps with configuring an IdP client using the IGEL UMS Console.
You can also configure the IdP client in the IGEL UMS Web App, see How to Configure an Identity Provider Client in the IGEL UMS Web App .
Prerequisites
You need to have an application configured for the IGEL UMS in your IdP.
Permission Requirement
The Identity Provider node is read-only for users with read permission for the node. It is only editable for users with write permission for the Identity Provider node. The permission can be set through the UMS Console structure tree. For details, see Access Rights in the Administration Area.
Configuring the IdP Cient
In the UMS Console go to UMS Administration > Global Configuration > Identity Provider.

Enter the details to configure the IdP client:
Display name: The name of your IdP client configuration, that will be displayed in UMS (e.g., “Okta SSO” or “Ping Configuration”).
Issuer URI: The URL provided by your IdP (e.g. “https://auth.pingone.eu/…”).
Client ID: The Client ID provided by your IdP.
Client secret: The secret key provided when you registered your application with the IdP. Click Show to toggle visibility if needed.
After filling in all fields, click Discover to save the configuration and create the connection with the IdP.
If the discovery is successful, the discovery data gets added to the IdP configuration details collapsible list.
If an error occurs during the discovery process, an alert dialog is shown and the form is reset and configuration is deleted.
After the client is configured, you can map IdP roles to users and user groups either in the UMS Console or in the UMS Web App, see Administrator Accounts in the IGEL UMS or How to Map Identity Provider Roles in the IGEL UMS Web App .
You can click Reset configuration to clear the data and start over.
All users who log in through the configured IdP will not be able to access the UMS after the reset.