Configuring OIDC Single Sign-on
Create OIDC directory in MetaDefender Core
- Sign in to MetaDefender Core.
- In the dashboard, click on User Managementin the left sidebar.
- On User Managementpage, selectDirectoriestab and clickAdd Directoryin the top right corner.

- In Add Directorypage, select OIDC asDirectory type, and enter a name for the new directory, such as MDCore-OIDC.
- Enter Host or IPwhere MetaDefender Core is hosted, for this example use https://127.0.0.1:8008.
- Copy the string generated under Login URLand store it as reply_uri.

Create and configure OIDC application in PingOne
- In the PingOne Overview page, navigate to Connectionson the sidebar.

- Click the plus button to add a new application.

- Enter the application name, MDCore-OIDC as an example, choose OIDC Web AppforApplication Type, and clickSave.

- Select Configurationtab, then click Edit button.

- In Edit Configurationpage, navigate toRedirect URIs, paste redirect_uri into the box below, and then clickSave.

- Back in Configurationtab, navigate toOIDC Discovery Endpoint, copy the link below, and save it as metadata_url.

- Expand Generalsection, navigate toClient IDandClient Secret, and copy and save them as client_id and client_secret, respectively.

- Select Attribute Mappingstab and click Edit button.

- In Edit Attribute Mappingspage, clickAddto create a new mapping.

In this step, we create a mapping from the key name used by MetaDefender Core to the one exported by PingOne. For example, we set given_name mapped to Given Name from PingOne. Later, given_name is utilized by MetaDefender Core to identify the logged-in user.
- Enter the attribute name, given_namein this example, select the itemGiven NameinPingOne Mappings, enableRequiredoption , and clickSaveto complete.

- Enable the new application in PingOne.

Complete configuration in MetaDefender Core
- Switch back to MetaDefender Core. Under Identity Provider, clickFetch URL, paste value of metadata_url into the box below, clickOK, and wait a moment for MetaDefender Core to check and set PingOne as its IdP.

- Under Service Provider, paste the values of client_id and client_secret into the boxes labeledClient IDandClient Secret, respectively.
- Fill in ${given_name} in the box under User Identified By.
- Select Default roleoption, choose the appropriate role to assign to users underUser Role, and clickAddto complete the settings in MetaDefender Core.

- On User Managementpage, toggle the new directory, MDCORE-OIDC in this example. A dialog box will appear to confirm the action. OnceEnableis clicked, all sessions will expire immediately.

Test the integration
- On the home screen of MetaDefender Core, click Login; the user is redirected to PingIdentity login page.

- Sign in using the account registered with PingIdentity.
- If everything goes well, MetaDefender Core dashboard is displayed with the user identity in the top right corner.

- Otherwise, access backup login page at <mdcore-host>#/public/backuploginfor trouble shooting.
