Configuring OIDC Single Sign-on
Register a new application in Azure
- Access Azure portal and sign in.
- On the home page, select Microsoft Entra IDunderAzure services.

- Select App registrationsunderManagesection on the left sidebar, then click onNew registrationon the top menu bar.

- In Register an applicationpage, fill in the name for the new application, using MDCore-OIDC as an example, and clickRegisterto complete.

- Select Token configurationin the left sidebar, hitAdd optional claim, chooseIDon the right sidebar, enable essential claims (given_name in this example) and clickAddat the bottom.

- Click Addon the popup to finish.

Enabled claims will be used later by MetaDefender Core to identify logged-in user.
Create OIDC directory in MetaDefender Core
- Sign in to MetaDefender Core.
- At the dashboard, click User Managementin the left sidebar.
- In User Managementpage, chooseDirectoriestab and clickAdd directoryon the top right corner.

- In Add Directorypage, choose OIDC inDirectory type.
- Fill in the name the new directory, such as MDCore-OIDC.
- In Service Providersection, fill inHost or IPwith the host or IP address where MetaDefender Core is hosted; for this example, it is https://localhost:8008.
- Copy the Login URLand store it somewhere for later use.

Complete configuration in Entra ID
- Back to Microsoft Entra ID, on MDCore-OIDCpage, selectOverviewsection in the left sidebar and click onAdd a Redirect URIlink to switch toAuthenticationpage.

- In Authenticationpage, clickAdd a platformand chooseWeboption in the right sidebar.

- Fill in Redirect URIsfield with theLogin URLcopied from MDCore, enableAccess tokensoption and clickConfigure.

- Select Overviewin the left sidebar again, copy the string next toApplication (client) IDand store as client_id.

- Click Endpointsin the top bar, copy the URI underOpenID Connect metadata documentin the right sidebar and store it as metadata_uri.

- Select Certificates & secretsin the left sidebar, go toClient secrets (0)tab, clickNew client secret, fill in the secret description and set expiration and, then clickAddto complete.

- A new client secret is created under Client secret (1)tab; copy the string underValuecolumn and store it as client_secret.

Entra ID will hide the client secret completely when page Certificate & secrets is left. Administrator is recommended to store the client secret in a safe place, otherwise they have to create a new one.
Complete configuration in MetaDefender Core
- Switch back to MetaDefender Core. Under Identity Providersection, clickFetch URLand paste metadata_uri gathered in Configure Azure stage into the box underFetch URL. ClickOKand wait a moment for MetaDefender Core to set Microsoft Entra ID as its IDP.

- Under Service Providersection, paste client_id and client_secret gathered in Configure Azure stage toClient IDandClient secretrespectively.

- Fill user identity under User identified by, ${given_name} is used in this example.
- Select Default roleoption and select correct role for the user underUser Role
- Click Addto complete the settings.

- In User Managementscreen of MetaDefender Core, toggle MDCORE-OIDC directory. A dialog box appears to confirm the action. OnceEnableis clicked , all sessions expire immediately.

Test the integration
- At the home screen of MetaDefender Core, click Login; the user is redirected to Microsoft Entra ID sign-in page.

- Sign in using the account registered with Microsoft Entra ID.
- If everything goes correctly, MetaDefender Core dashboard is displayed with user's identity shown in the top right corner.

- Otherwise, access backup login page at <mdcore-host>#/public/backuploginfor trouble shooting.
