Configure Microsoft Entra ID - OpenID Connect

Before you begin

There are two prerequisites to complete before configuring the Identity Provider in ExtremeCloud Universal ZTNA.
  • Create ClientID, Client Secret, and Discovery URL in Entra ID under App Registration. Save a copy of each to use in this procedure.
  • Your organization's AD-synced users must have administrative privileges in Entra ID so Microsoft can authorize the user during log in. To set the permission, navigate to App Registrations > [Your Application] > API Permissions.

About this task

Use this task to configure a Microsoft Entra ID - OpenID Connect Identity Provider.

Procedure

  1. Select Onboarding.
    The welcome window displays.
  2. Select Secure Hybrid Access [Secure Application Access or Secure Network Access].
  3. On the Identity Provider window, select Microsoft Entra ID.
  4. Select Continue.
    The Identity Provider window displays.
  5. Enter Client ID.
  6. Enter Client Secret.
  7. Enter Tenant ID.
    Note

    Note

    Redirect URLs are on the IdP set up page on the UI. You can copy and update redirect URLs in Entra ID. In Entra ID, specify the URLs under the URI section. These URLs redirect the user to the portal after a successful authorization by Microsoft during log-in and sign-up.
  8. Optional: Select Secure Network Access if the Network Access functionality will be used. If so, the same application can be leveraged as Application access. However, if Multi-Factor Authentication is enabled in Entra ID, a separate application must be created and a conditional access policy must be leveraged to disable MFA on this specific application.
    If the Secure Network Access check box is checked, the administrator must create a separate Entra ID Application in Entra ID and provide the Client ID, Client Secret and Tenant ID.
  9. Optional: To provision users and user groups in Entra ID and then sync them with Universal ZTNA, Synchronize Users and Groups with Microsoft Entra ID.
  10. Optional: Select All Domains or Custom and enter the domain.
    If you select Custom, fill in the approved domains. Applicable for network and application access.
  11. Select Validate Information.
    A message in the upper right corner confirms the validation test passed.
  12. Select Update.
    Update Identity Provider pop-up window displays. This message cautions you that the Identity Provider change logs out current users.
  13. If you decide to continue, select Confirm.
  14. Select Next.
    The Onboarding - Access Groups window displays.
  15. Configure Access Groups.
  16. Configure Resources.
  17. Configure Applications and Application Groups.
    You can skip this step if you are using Secure Network Access.
  18. Configure Policies.

Results

Your onboarding is complete. Your users, applications, and devices can now access the network securely.