US English (US)
FR French
DE German
PL Polish
SE Swedish
FI Finnish

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

English (US)
US English (US)
FR French
DE German
PL Polish
SE Swedish
FI Finnish
  • Log in
  • Home
  • Identity Governance and Administration (IGA)
  • IGA solution library
  • Instructions & guidelines
  • Customer instructions

Secure Access - Customer instructions for Entra ID configuration OpenID Connect (OIDC)

How to configure Entra ID OpenID Connect for Secure Access authentication

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Service Management
    Matrix42 Professional Solution Matrix42 Core Solution Enterprise Service Management Matrix42 Intelligence
  • Identity Governance and Administration (IGA)
    IGA overview IGA solution library
  • Platform
    ESM ESS2 ESS Efecte Chat for Service Management Integrations Add-ons
  • Release Notes for M42 Professional, IGA, Conversational AI
    2026.1 2025.3 2025.2 2025.1 2024.2 2024.1 2023.4 2023.3 2023.2 2023.1 2022.4 2022.3 Release Information and Policies
  • Other Material
    Terms & Documentation Guidelines Accessibility Statements
  • Services
+ More
    • Service Management

    • Identity Governance and Administration (IGA)

    • Platform

    • Release Notes for M42 Professional, IGA, Conversational AI

    • Other Material

    • Services

Secure Access - Customer instructions for Entra ID configuration OpenID Connect (OIDC)

How to configure Entra ID OpenID Connect for Secure Access authentication

This article provides instructions for customer to configure Microsoft Entra ID (previously Azure AD) for Authentication using OpenID Connect (OIDC) with Matrix42 Pro and IGA solutions. 

Usually, this configuration is carried out by the customer's Entra ID or authentication specialist. It should take no more than half a day to implement and test. Please note that some of the screenshots may appear differently in the customer's Entra ID.

These instructions are applicable to all Matrix42 Pro and IGA solutions (e.g., ITSM, IGA, HR) that use the Secure Access component for authentication.

All the steps below are required, unless separately specified optional.

Note

This App Registration application is supposed to be used only with Secure Access, for users authenticating to Matrix42 Professional and IGA solutions.

If you also use OIDC with Microsoft Graph API Native Connectors, it is suggested to create separate application for those. In those cases see Native Connectors - Customer instructions for Entra ID 

 

How to Configure Entra ID for OpenID Connect (OIDC)

Application Registration

Customer needs to configure their Entra tenant to allow Matrix42 Security Access component to fetch user accounts and groups information. Configuration is made after log-in to Entra ID (previously Azure AD) console. 

  1. Go to https://entra.microsoft.com and after login Select App registrations (NOTE! This is not an "Enterprise Application", which is created via another path, but might be confused with this).
  2. Select New registration.
  3. Enter a name for application.
  4. Select correct Supported Account Types depending on your use case. This is very important selection, so if you are not sure what to select, consult someone more experienced with this configuration.
    1. Option 1 - preferred for most cases: If you are building a basic configuration, where all users you want to login to Matrix42 system belong to your tenant, select Accounts in this organizational directory only (<this tenant> only - Single tenant)
    2. Option 2: - In this use case, you are sure that you want users from the other tenant(s) also be able to login to your Matrix42 solutions (you have for example Multi service provider (MSP). 
      Select: Accounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant). 
      1. Note that when having multi tenant app, Azure will not send groups as names, it sends groups always only as IDs. 
      2. Note! If you select this multitenant option, Matrix42 need to configure all allowed tenants to Identity providers Issuer field as a comma separated list.
  5. Under Redirect URI, select Web as the platform, and then enter the reply URL of Secure Access (this can be added later if Matrix42 has not yet provided URI).
  6. Select Register.

How to Set Redirect URI After Creating Application

  1. Go to https://entra.microsoft.com and after login, select App registrations.
  2. Find and open application you created.
  3. Select Authentication from the left menu.
  4. Add Redirect URI
    Platform type: Web
    Redirect URI: the URL you got from Matrix42 OpenID Connect v1.0 Identity providers Redirect URI -attribute.

Certificates & Secrets

Secure Access supports secure connection with Entra ID by using Client Secrets.

Client Secret Instructions

  1. In the Microsoft Entra admin center, in App registrations, select your application.
  2. Select Certificates & secrets > Client secrets > New client secret.
  3. Add a description for your client secret.
  4. Select an expiration for the secret or specify a custom lifetime.
    1. Client secret expiration is limited to 730 days / 24 months (two years) or less. You can't specify a custom expiration longer than 730 days / 24 months.
    2. Microsoft recommends that you set an expiration date which is less than 365 days / 12 months away.
  5. Select Add.
  6. Record the secret's value for use in your client application code.

    This secret value is never displayed again after you leave this page. If the secret value is lost / not recorded, then the only way to get a new secret value is to reconfigure one.

     

Mark in the calendar and the solution year clock the expiration date of your secret.

This is so, that you remember to add a new secret and take it into use in Secure Access before the old one expires. 

Plan the secret key change advance, because once the secret expires, users of Matrix42 Pro and IGA solutions are NOT able to authenticate in to the system via OIDC authentication.

 

Token Configuration

For basic OpenID Connect (OIDC) login to work, you don't need to add any Optional claim.

Adding Email Claim

But it is highly recommended to also send user's email address from Entra to Secure Access. From there, user email information is sent to Matrix42 Pro and IGA solution. This is needed for the Chat-functionality (if email is missing then the chat is not available). 

To do this, you need to add email-claim:

  1. Go to Token configuration, click Add optional claim to add email claim.
  2. Select token type: ID and Claim: email

Add Groups Token

Optionally, if you want to also send user's group information from Entra to Secure Access, you need to add a groups-claim. 

In Secure Access you can use groups-claim information to calculate userLevel and esm roles:

  1. Go to Token configuration, click Add groups claim.
  2. Select correct group types, depending on what type of groups you want to send to Secure Access component. 
    1. Usually Security groups is enough, but it depends how customers Entra ID groups have been designed.
  3. Choose Customize token properties by type.
    1. Note that the default is Group ID, but with Matrix42 Professional and IGA solution, sAMAccountName is usually a better option if groups are not created directly from Entra.
    2. If you want to send cloud groups in the claim as groupIDs, you just select "group type" and select IDs.

API Permissions

API permissions are granted as a minimum set of permission. This means that only necessary access needs to be allowed to Secure Access application.

  1. Select “API permissions” from the side bar.
  2. On that page select “Add a permission”. 
    1. You should already have Microsoft Graph > User.Read added, you can leave this as is.
  3. Select "Microsoft Graph".
  4. Select Delegated permissions
  5. Scroll down to Directory and select needed permissions.
    1. Permission: User.Read, Type: Delegated
    2. Permission: email, Type: Delegated
      1. This is only required if an email-claim has been configured and is required.
  6. Click “Add permissions”.
  7. Now the Configured permissions are displayed.

Optional: Configure Entra ID to Emit Federated/Guest UPN in OIDC ID Tokens

This configuration is suggested to be done, if you allow guest users login.

  1. Open your App Registration.
  2. Select your app that you have created (Riku M42 native connectors in the screenshot). 
  3. Go to Token configuration
  4. Select Add optional claim.
  5. Select Token type as ID and Claim as upn
  6. Click Add to add that token.
  7. A pop up will appear, check the checkbox, and click Add.
  8. Edit the claim we just configured, by selecting Edit option behind three dots:
  9. Set Externally authenticated to Yes and Save.

Configuration for federated/guest users is now done. 

Their upn will be shown in ID token in this format: <upn>_<homedomain>#EXT#@<resourcedomain> for example:  john_contoso.com#EXT#@contoso.onmicrosoft.com

This setting doesn't affect Internal users upn format, it is still in normal upn format, for example: john.doe@contoso.com

OIDC Troubleshooting for  Entra ID configuration

Troubleshooting

If you run across the issues described below, it is recommended to contact Matrix42 as some of the steps can only be done by at our end.

Username Shown in Weird Format on Portal

Example of this issue in portal, where username is a weird string and the circle has also number or weird character:

In ESS2 portal, missing/weird username mapper affecting UI is cannot be shown.

Cause: Username mapper missing or configured incorrectly.

Fix: Contact Matrix42.

 

Weird Username and/or Missing Email on Entra Authentication

After Entra authentication, you see screen like this, with weird username and/or email missing.

Cause: Username mapper missing or configured incorrectly.

Fix: Contact Matrix42 

Error Screen After Entra Authentication - Application with Identifier

After Entra authentication you see a screen like this, containing text Application with identifier [string] not found in the directory.

Cause: As you can see error message, identifier has extra R character on beginning of it, so it doesn’t match Entra applications Application ID.

Fix: : Contact Matrix42 and provide the Application ID value.

Redirect URI Error After Entra Login

After Entra login you see screen like this:
 

Cause: The error message states that Redirect URI  is not configured to application on Entra. It has not been configured at all, or there is a typo on that URI on Entra configuration.
(example in the screenshot: https://rikurestdemo20251.efectecloud-demo.com/auth/realms/rikurestdemo20251/broker/oidctest/endpoint)

Fix: 

  1. Contact Matrix42 and request for your Secure Access' OIDC Identity Provider's Redirect URI. 
  2. Go to your Entra.
  3. Go to “App registration”.
  4. From the list, select your application that you use for OIDC login configurations.
  5. Select Authentication.
  6. Under Redirect URIs remove the faulty Redirect URI.
  7. Click Add URI.
  8. Add the correct redirect URI (this was copied on step 1.). 
  9. Test again.

Login doesn't work and keycloak.log contains errors

If log contains error like this:

Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target

Then issue is that Secure Access doesn't trust Entra certificates. 

Follow this guidance https://docs.efecte.com/configure-authentication/download-and-install-certificates-to-secure-access-esa chapter "Add Microsoft related certificates to Secure Access" to install needed certificates to Secure Access and then try login again.

configuration secure access openid entra id customer instructions oidc openid connect claim client secret app registrations guest

Was this article helpful?

Yes
No
Give feedback about this article

Table of Contents

Related Articles

  • Secure Access
  • Native Connectors - Customer instructions for Entra ID
  • Customer Instructions for IGA Project
  • Efecte Secure Access - Customer instructions for HAKA Authentication

Copyright 2026 – Matrix42 Professional.

Matrix42 homepage


Knowledge Base Software powered by Helpjuice

0
0
Expand