Before you begin
There are two prerequisites to complete before configuring the Identity Provider in
ExtremeCloud
Universal ZTNA.
- Create ClientID,
Client
Secret, and Discovery URL
in Entra ID under App Registration. Save a copy of each to use in this
procedure.
- Your organization's AD-synced
users must have administrative privileges in Entra ID so Microsoft can
authorize the user during log in. To set the permission, navigate to
.
About this task
Use this task to configure a Microsoft Entra ID - OpenID Connect Identity Provider.
Procedure
-
Select Onboarding.
The welcome window
displays.
-
Select Secure Hybrid
Access [Secure Application
Access or Secure Network
Access].
-
On the Identity Provider
window, select Microsoft Entra ID.
-
Select Continue.
The Identity Provider
window displays.
-
Enter Client ID.
-
Enter Client
Secret.
-
Enter Tenant ID.
Note
Redirect URLs are on the IdP set up page on the
UI. You
can copy and update redirect URLs in Entra ID. In Entra ID, specify the
URLs under the URI section. These URLs redirect the user to the
portal
after a successful authorization by Microsoft during log-in and sign-up.
- Optional:
Select Secure Network
Access if the Network Access functionality will be used. If so,
the same application can be leveraged as Application access. However, if
Multi-Factor Authentication is enabled in Entra ID, a separate application must
be created and a conditional access policy must be leveraged to disable MFA on
this specific application.
If the Secure Network Access check box is
checked, the administrator must create a separate Entra ID Application in Entra
ID and provide the Client ID, Client Secret and Tenant ID.
- Optional:
To provision users and user
groups in Entra ID and then sync them with Universal ZTNA, Synchronize Users and Groups with Microsoft Entra ID.
- Optional:
Select All Domains or Custom and enter the
domain.
If you select Custom, fill in the
approved domains. Applicable for network and application access.
-
Select Validate
Information.
A message in the upper
right corner confirms the validation test passed.
-
Select Update.
Update Identity
Provider
pop-up window displays. This message cautions you that the
Identity Provider change logs out current users.
-
If you decide to continue,
select Confirm.
-
Select Next.
The Onboarding - Access
Groups window displays.
-
Configure Access Groups.
-
Configure Resources.
-
Configure Applications and Application Groups.
You can skip this step if you
are using Secure Network Access.
-
Configure Policies.
Results
Your onboarding is complete. Your users, applications, and devices can now access the
network securely.