Configure external IdP authentication

Set up GIP to delegate authentication to an external Identity Provider (IdP) while continuing to manage user authorizations.

To activate delegated authentication, you must run the StarterApp to upgrade your GIP database to GIP 6.0. For details, see Migrate your Genero Identity Provider database.
Important:

Before proceeding, register an application with the external Identity Provider (for example: Azure AD, Google, or Okta) and record the Issuer URL, Client ID, and Client Secret. These values will be required during the following configuration steps. Registration steps with IdPs vary by provider; consult the external IdP's documentation for instructions on creating an application and retrieving these values.

  1. Open the Console App and navigate to the ID provider menu.
    The Console App is located at http[s]://host:port/[gas/]ua/r/admin/ConsoleApp.

    Alternatively, open the GAS demos page (demos.html) and launch the Console App from there. If GAS is running in standalone mode, go to: http://localhost:6394/demos.html

  2. Select New to create a new Identity Provider.
  3. Enter the required information for the Identity Provider:
    Figure: Register a new Identity Provider

    Image shows the Console App screen to register a new Identity Provider
    Where:
    • Name is a label for the Identity Provider (for example, "AzureAD").
    • Issuer is the Identity Provider's issuer URL (for example, https://login.microsoftonline.com/tenant/v2.0).

      When the Issuer URL is valid, click Fetch URLs to auto-populate the identity provider endpoint fields. GIP checks the Issuer URL by fetching the OpenID Connect discovery document (/.well-known/openid-configuration) and enables Fetch URLs if required endpoints are found.

    • Client ID is the client/application ID registered with the Identity Provider.
    • Secret ID is the client secret associated with the client ID, used for authentication.
  4. Save the new Identity Provider.

The GIP sign-in page will now display an option for users to select and authenticate with the registered Identity Provider.

Users will first have to request a delegated account using their credentials from the external IdP, wait for the GIP administrator to validate it, and only then will they be able to authenticate using the external IdP.