Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

OpenManage Enterprise 4.1.x User's Guide

Add an OIDC provider

Adding, enabling, and registering an OpenID Connect (OIDC) provider (Keycloak or PingFederate) allows for an authorized client login to OpenManage Enterprise. This process generates a Client ID.

About this task

To add an OpenID Connect provider to OpenManage Enterprise, go to the Application Settings > Users > OIDC screen and do the following:
NOTE:Only a maximum of four OpenID Connect provider clients can be added.

Steps

  1. Click Add to activate the Add New OpenID Connect Provider screen.
  2. Fill the following information in the respective fields:
    1. Name: Name for the OIDC client.
    2. Discovery URI: OpenManage Enterprise uses this path to access the provider. For example: https://keycloak.exampledomain.com:8443/realm/<realmname>.
    3. Authentication type: Choose from one of the following methods that the access token must use to access the appliance:
      1. Initial Access Token: Provide the Initial access token. The OIDC provider supplies this value.
        NOTE: If the DNS name of the key cloak generates the Initial Access Token, the registration must use the DNS name. Similarly, if the IP address of the key cloak generates the Initial Access Token, then the registration must use the IP Address.
      2. Username and Password: Provide the username and password to the OIDC provider.
    4. (Optional) Certificate Validation check box: Check the box, upload the OIDC providers certificate by clicking Browse or dragging and dropping it into the designated box.
    5. (Optional) Click Test URI and SSL Connection to test the connection with the OpenID Connect provider.
      NOTE:Test connection does not depend on the username and password or the initial access token details. It only checks for the validity of the Discovery URI provided.
    6. (Optional) Enabled check box - You can select the check box to allow the authorized client access tokens to log in to the appliance.
  3. Click Finish.

Results

The newly added OpenID Connect provider is listed on the Application Settings > Users > OpenID Connect Providers screen, and the Client ID is displayed on the right pane.

Next steps:

Configure OIDC login using PingFederate

Configure OIDC login using Keycloak


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\