Configure OpenID Connect
PM Cloud supports OpenID Connect authentication. You can change your authentication provider from the default AzureB2B to OpenID Connect, or update your OpenID Connect settings, without having to contact Support.
You must first set up a PM Cloud instance in your OpenID Connect provider. Steps are provided in the section below.
Configure an Authentication Provider
When you start from the default configuration, use this procedure to set up the configuration.
If you choose to configure OpenID Connect, you will not be able to revert to the default settings.
To set up an OpenID Connect provider:
- Select the Configuration menu, and then click Authentication Provider Settings.
- Click Enable OpenID Configuration. After you have completed and saved the OpenID configuration, this switch no longer appears on this page.
- Enter information for the following:
- Provider URL: Domain for the authentication. Currently supports Microsoft, Okta, and Ping Identity.
- Client ID: The client ID.
- Client Secret: Secret key.
- Check the box. We recommend reviewing the settings you configured. You can potentially lock yourself out of the system if the settings are incorrect. The Save Changes button is only available after you check the box.
- Click Save Changes.
If you log on before the timer expires, the newly added authentication provider settings are retained.
PMC OpenID Connect Workflow for Existing Customers
Here is the workflow to get up and running with PMC using OpenID Connect authentication.
- You will receive an email from BeyondTrust after the request is processed.
- In the email, click the link to open the BeyondTrust OpenID Setup page.
- Enter the OpenID Connect information: domain, client ID, and client secret. Click Save Setup. The OpenID credentials are saved.
- The Privilege Management Console login page opens. Click Log In.
- PM Cloud opens to the Home page.
Add the PM Cloud Application to Microsoft, Okta, or Ping Identity
PM Cloud supports Microsoft Azure AD, Okta OpenID, and Ping Identity Connect providers. The following sections provide a high-level overview on adding the PM Cloud instance to your respective authentication provider. For complete instructions, refer to the provider's documentation.
The migration to OIDC will work when the email address sent from Okta or Azure AD matches for existing users. If email addresses are different or the domain name is not on the list of allowed domains in PM Cloud, then the authentications will fail.
Add PMC Instance to Microsoft Azure AD
- Start Microsoft Azure AD.
- In the menu, click App Registrations.
- Click New Registration.
- Enter a Name.
- Under Supported account types, select Accounts in this org directory only.
- Enter the Redirect URI. While providing this now is optional and can be changed later, a value is required for most authentication scenarios.
- From the dropdown list, select the Web platform.
- Select https://<deployment>-services.pm.beyondtrustcloud.com/oauth/signin-oidc.
- Click Register.
- After PMC registers, select Authentication in the menu.
- Add the following to the Redirect URIs: https://<deployment>-services.pm.beyondtrustcloud.com/oauth/signout-callback-oidc.
- Select Certificates & secrets in the menu.
- Click New client secret, and copy the secret ID and value. When generating a new secret, you must select an expiry for the secret. We recommend selecting Recommended: 6 months
After you add PMC to Microsoft Azure AD, you can get the information you need to set up the OpenID Connect authentication. The PMC OpenID connect setup wizard requires these values:
- OpenID Domain: https://login.microsoftonline.com/<Directory (tenant) ID>. The directory or tenant ID uses the format 31b8dbb9-fb8b-437a-8920-f23c8e0188b1.
- OpenID Client ID: Application (client) ID.
- OpenID Client Secret: Client secret value.
- On the app registration Overview page, copy the client ID and the tenant ID.
Add PMC Instance to Okta
Supported Features
The Privilege Management Cloud for Windows and Mac (also called PM Cloud) - Okta integration allows logging into PM Cloud platform using SP-initiated SSO flow.
Configure the Integration
- Access your Okta instance.
- Navigate to Applications, and then click the Browse App Catalog button.
- Search for an app called BeyondTrust Privilege Management Cloud - Windows and Mac.
- Click Add Integration.
- Click Done.
- While in the new application, navigate to Sign On, and then click Edit.
- Navigate to the Advanced Sign-on Settings and provide the Base Service URL which follows the format https://{dns}-services.pm.beyondtrustcloud.com/). Click Save.
- After you add the PMC App to Okta, you can get the information you need to set up the OpenID Connect authentication.
- You must get the following information from the Edit page:
- Domain or Issuer, for example, https://dev-12345.okta.com
- Client ID
- Client Secret
Confirm the domain name configured in Okta. This domain name might be different than the domain configured for your email address. For example, while the domain managed in Okta might be domain.com, the email address might be user@email.com. Both pieces of information are required.
- Log in to your PM Cloud instance to complete the configuration. Navigate to Configuration and then Authentication Provider Settings.
- Select Okta for the OpenID Connect Provider.
- Provide the domain or issuer URL, client ID, and client secret.
- Save and test the configuration.
Add PMC Instance to Ping Identity
We currently support PingOne, the SaaS service from Ping Identity.
- Start up your Ping Identity instance.
- In the menu, click Connections, and then click Applications.
- At the right of the Applications title, click the plus sign (+) to add an application.
- Enter a name for the application (required), and then add a short description (optional).
- Select OIDC Web App and click Save.
- Click the Configuration tab.
- To edit the configuration, click the pencil/edit icon.
- Under Redirect URLs, click + Add, and then add the sign-in and sign-out URLs. If you are modifying an existing instance, you might need to open the General section dropdown first.
- Sign-in redirect URL: https://{dns}-services.pm.beyondtrustcloud.com/oauth/signin-oidc
- Sign-out redirect URL: https://{dns}-services.pm.beyondtrustcloud.com/oauth/signout-callback-oidc
- Under Token Endpoint Authentication Method, select Client Secret Post, and then click Save.
- Click the Resources tab.
- To edit the resource, click the pencil/edit icon.
- In the Scopes list, click the + next to profile openID to add it to the Allowed Scopes. You can also filter the list of options by OpenID to access this option.
- Click Save.
- To close the panel, at the top right of the Edit panel, click the X.
- At the right of the new application entry, toggle the switch to on to give access to users.
- Click the Configuration tab again. For the PMC OpenID Connect set-up wizard, you need to copy the following information from the Configuration page:
- Issuer: Prefix the protocol HTTPS://
- Client ID
- Client Secret
Change the PM Cloud OpenID Connect Settings
Once you have set up your OpenID Connect Settings to use Microsoft, Okta, or Ping Identity, you might need to switch to another one at some point.
To change your existing OpenID Connect settings:
- Click the Configuration menu, and then select Authentication Provider Settings.
- Click Change OpenID Connect Provider.
- Select a different provider, and then enter the Provider URL (or Issuer), Client ID, and Client Secret information.
- Review your settings, and then check the verification box.
- Click Save Changes.
If you log on before the timer expires, the newly added authentication provider settings are retained.