Document toolboxDocument toolbox

(12.4-en) Single Sign-On in IGEL OS 12

Single Sign-On (SSO) is an authentication method that can be used via a cloud-based identity provider (IdP) to access the local device and apps. This article describes the options used for configuring SSO in IGEL OS.

See https://igel-jira.atlassian.net/wiki/spaces/IGELOS12BSDOCP/pages/127821981 for a detailed description of the entire SSO configuration process.


Menu path: Security > Logon > Single Sign-On

 

 

Single Sign-On with identity provider

☑ SSO is used as the authentication method. 

To have a fallback option if something goes wrong with SSO, e.g. a network failure, it is recommended to configure local login in addition under Security > Logon > Local User. For more information, see https://igel-jira.atlassian.net/wiki/spaces/IGELOS12BSDOCP/pages/127792570 .

☐ SSO is not used. (Default)

 

Identity provider

The identity provider used for the SSO configuration.
Possible options:

  • Azure AD: Use Microsoft Entra ID as IdP

  • Okta

  • OpenID Connect

  • Ping Identity | PingOne

  • VMware Workspace ONE Access

Identity Provider Is Set to "Azure AD"

Azure AD Tenant Name/ID

The value you have obtained as Directory (tenant) ID in the Microsoft Entra ID Portal.

Application (client) ID

The value you have obtained as Application (client) ID in the Microsoft Entra ID Portal.

 

Client secret

The client secret that was created in the Microsoft Entra ID Portal. 

 

If the login method is configured and the Allow system logoff option is enabled under System > Power Options > Shutdown, the user can log off the device through the shutdown menu. For information on how to access the shutdown menu, see https://igel-jira.atlassian.net/wiki/spaces/IGELOS12BSDOCP/pages/127722173. For information on how to configure the shutdown menu, see .

Identity Provider Is Set to "Okta"

Okta URL

The URL of the Okta identity provider.

 

Client ID

The client ID that was created in Okta.

 

Client secret

This is a value created by the identity provider. The value can be copied from the Identity Provider Admin Console.

Identity Provider Is Set to "OpenID Connect"

This option can be used for various identity providers that support OpenID Connect.

Issuer URL

The URL at the identity provider's site where the OpenID configuration document for your application can be found. This is the part of the path that precedes /.well-known/openid-configuration

 

Client ID

The client ID that is registered in your identity provider.

 

Client secret

The client secret that has been created by your identity provider.

Identity Provider Is Set to "Ping Identity | PingOne"

PingOne issuer URL

The URL at the Ping Identity / PingOne site where the OpenID configuration document for your application can be found. This is the part of the path that precedes /.well-known/openid-configuration

 

Client ID 

The client ID that is registered in Ping Identity / PingOne for your application.

 

Client secret

The client secret that has been created in Ping Identity / PingOne for your application.

Identity Provider Is Set to "VMware Workspace ONE Access"

Workspace ONE Access issuer URL

The URL at the Workspace ONE Access site where the OpenID configuration document for your client can be found. This is the part of the path that precedes /.well-known/openid-configuration

 

Client ID

The client ID that is registered in Workspace ONE Access for your client.

 

Client secret

The client secret that has been created in Workspace ONE Access for your client.

Automatic Desktop Login

As an alternative to the interactive desktop login, predefined user credentials can automatically be provided to the IdP on startup. The credentials are stored securely on the endpoint device.

Automatic login is available for the following IdPs:

  • Okta

  • Microsoft Entra ID (formerly known as Microsoft Azure AD)

  • Ping Identity | PingOne

  • VMware Workspace ONE Access

Automatically perform login

☑ After startup, the endpoint device performs the login automatically using the Username for autologin and the Password for autologin.

Username for autologin

The name of a user known to the IdP used.

 

Password for autologin

The password of the user provided in Username for autologin.