Secure Access - Customer instructions for Entra ID configuration OpenID Connect (OIDC)
How to configure Entra ID OpenID Connect for Secure Access authentication
Secure Access - Customer instructions for Entra ID configuration OpenID Connect (OIDC)
How to configure Entra ID OpenID Connect for Secure Access authentication
This article provides instructions for customer to configure Microsoft Entra ID (previously Azure AD) for Authentication using OpenID Connect (OIDC) with Matrix42 Pro and IGA solutions.
Usually, this configuration is carried out by the customer's Entra ID or authentication specialist. It should take no more than half a day to implement and test. Please note that some of the screenshots may appear differently in the customer's Entra ID.
These instructions are applicable to all Matrix42 Pro and IGA solutions (e.g., ITSM, IGA, HR) that use the Secure Access component for authentication.
All the steps below are required, unless separately specified optional.
Note
This App Registration application is supposed to be used only with Secure Access, for users authenticating to Matrix42 Professional and IGA solutions.
If you also use OIDC with Microsoft Graph API Native Connectors, it is suggested to create separate application for those. In those cases see Native Connectors - Customer instructions for Entra ID
How to Configure Entra ID for OpenID Connect (OIDC)
Application Registration
Customer needs to configure their Entra tenant to allow Matrix42 Security Access component to fetch user accounts and groups information. Configuration is made after log-in to Entra ID (previously Azure AD) console.
- Go to https://entra.microsoft.com and after login Select
App registrations(NOTE! This is not an "Enterprise Application", which is created via another path, but might be confused with this).
- Select
New registration.
- Enter a name for application.
- Select correct
Supported Account Typesdepending on your use case. This is very important selection, so if you are not sure what to select, consult someone more experienced with this configuration.-
Option 1 - preferred for most cases: If you are building a basic configuration, where all users you want to login to Matrix42 system belong to your tenant, select
Accounts in this organizational directory only (<this tenant> only - Single tenant) -
Option 2: - In this use case, you are sure that you want users from the other tenant(s) also be able to login to your Matrix42 solutions (you have for example Multi service provider (MSP).
Select:Accounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant).- Note that when having multi tenant app, Azure will not send groups as names, it sends groups always only as IDs.
- Note! If you select this multitenant option, Matrix42 need to configure all allowed tenants to Identity providers Issuer field as a comma separated list.
-
Option 1 - preferred for most cases: If you are building a basic configuration, where all users you want to login to Matrix42 system belong to your tenant, select
- Under
Redirect URI, selectWebas the platform, and then enter the reply URL of Secure Access (this can be added later if Matrix42 has not yet provided URI).
- Select
Register.
How to Set Redirect URI After Creating Application
- Go to https://entra.microsoft.com and after login, select
App registrations. - Find and open application you created.
- Select Authentication from the left menu.
- Add Redirect URI
Platform type:Web
Redirect URI: the URL you got from Matrix42 OpenID Connect v1.0 Identity providersRedirect URI -attribute.
Certificates & Secrets
Secure Access supports secure connection with Entra ID by using Client Secrets.
Client Secret Instructions
- In the Microsoft Entra admin center, in
App registrations, select your application.
- Select
Certificates & secrets > Client secrets > New client secret.
- Add a description for your client secret.
- Select an expiration for the secret or specify a custom lifetime.
- Client secret expiration is limited to 730 days / 24 months (two years) or less. You can't specify a custom expiration longer than 730 days / 24 months.
- Microsoft recommends that you set an expiration date which is less than 365 days / 12 months away.
- Select
Add.
- Record the secret's value for use in your client application code.
This secret value is never displayed again after you leave this page. If the secret value is lost / not recorded, then the only way to get a new secret value is to reconfigure one.
Mark in the calendar and the solution year clock the expiration date of your secret.
This is so, that you remember to add a new secret and take it into use in Secure Access before the old one expires.
Plan the secret key change advance, because once the secret expires, users of Matrix42 Pro and IGA solutions are NOT able to authenticate in to the system via OIDC authentication.
Token Configuration
For basic OpenID Connect (OIDC) login to work, you don't need to add any Optional claim.
Adding Email Claim
But it is highly recommended to also send user's email address from Entra to Secure Access. From there, user email information is sent to Matrix42 Pro and IGA solution. This is needed for the Chat-functionality (if email is missing then the chat is not available).
To do this, you need to add email-claim:
- Go to
Token configuration, clickAdd optional claimto add email claim. - Select token type:
ID and Claim: email
Add Groups Token
Optionally, if you want to also send user's group information from Entra to Secure Access, you need to add a groups-claim.
In Secure Access you can use groups-claim information to calculate userLevel and esm roles:
- Go to
Token configuration, clickAdd groups claim. - Select correct group types, depending on what type of groups you want to send to Secure Access component.
- Usually
Security groupsis enough, but it depends how customersEntra IDgroups have been designed.
- Usually
- Choose
Customize token properties by type.- Note that the default is
Group ID, but with Matrix42 Professional and IGA solution,sAMAccountNameis usually a better option if groups are not created directly fromEntra.
- If you want to send cloud groups in the claim as
groupIDs, you just select "group type" and selectIDs.
- Note that the default is
API Permissions
API permissions are granted as a minimum set of permission. This means that only necessary access needs to be allowed to Secure Access application.
- Select “API permissions” from the side bar.
- On that page select “Add a permission”.
- You should already have Microsoft Graph > User.Read added, you can leave this as is.
- You should already have Microsoft Graph > User.Read added, you can leave this as is.
- Select "Microsoft Graph".
- Select
Delegated permissions
- Scroll down to
Directoryand select needed permissions.- Permission: User.Read, Type: Delegated
- Permission: email, Type: Delegated
- This is only required if an email-claim has been configured and is required.
- Click “
Add permissions”. - Now the Configured permissions are displayed.
Optional: Configure Entra ID to Emit Federated/Guest UPN in OIDC ID Tokens
This configuration is suggested to be done, if you allow guest users login.
- Open your
App Registration. - Select your app that you have created (
Riku M42 native connectorsin the screenshot). - Go to
Token configuration - Select
Add optional claim. - Select
Token typeasIDandClaimasupn - Click
Addto add that token.
- A pop up will appear, check the checkbox, and click
Add.
- Edit the claim we just configured, by selecting
Editoption behind three dots:
- Set
Externally authenticatedtoYesandSave.

Configuration for federated/guest users is now done.
Their upn will be shown in ID token in this format: <upn>_<homedomain>#EXT#@<resourcedomain> for example: john_contoso.com#EXT#@contoso.onmicrosoft.com
This setting doesn't affect Internal users upn format, it is still in normal upn format, for example: john.doe@contoso.com
OIDC Troubleshooting for Entra ID configuration
Troubleshooting
If you run across the issues described below, it is recommended to contact Matrix42 as some of the steps can only be done by at our end.
Username Shown in Weird Format on Portal
Example of this issue in portal, where username is a weird string and the circle has also number or weird character:

In ESS2 portal, missing/weird username mapper affecting UI is cannot be shown.
Cause: Username mapper missing or configured incorrectly.
Fix: Contact Matrix42.
Weird Username and/or Missing Email on Entra Authentication
After Entra authentication, you see screen like this, with weird username and/or email missing.

Cause: Username mapper missing or configured incorrectly.
Fix: Contact Matrix42
Error Screen After Entra Authentication - Application with Identifier
After Entra authentication you see a screen like this, containing text Application with identifier [string] not found in the directory.

Cause: As you can see error message, identifier has extra R character on beginning of it, so it doesn’t match Entra applications Application ID.
Fix: : Contact Matrix42 and provide the Application ID value.
Redirect URI Error After Entra Login
After Entra login you see screen like this:

Cause: The error message states that Redirect URI is not configured to application on Entra. It has not been configured at all, or there is a typo on that URI on Entra configuration.
(example in the screenshot: https://rikurestdemo20251.efectecloud-demo.com/auth/realms/rikurestdemo20251/broker/oidctest/endpoint)
Fix:
- Contact Matrix42 and request for your Secure Access' OIDC Identity Provider's
Redirect URI.
- Go to your Entra.
- Go to “
App registration”. - From the list, select your application that you use for OIDC login configurations.
- Select
Authentication.
- Under
Redirect URIsremove the faulty Redirect URI.
- Click
Add URI. - Add the correct redirect URI (this was copied on step 1.).
- Test again.
Login doesn't work and keycloak.log contains errors
If log contains error like this:
Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
Then issue is that Secure Access doesn't trust Entra certificates.
Follow this guidance https://docs.efecte.com/configure-authentication/download-and-install-certificates-to-secure-access-esa chapter "Add Microsoft related certificates to Secure Access" to install needed certificates to Secure Access and then try login again.
Table of Contents