Identity Providers Management
To manage Identity Providers (IdPs), navigate to:
Integration Manager → Secure → Identity Providers
This interface enables administrators to add, edit, enable/disable, or delete identity providers and manage attribute mappers for each provider.
Overview
The Identity Providers page displays a searchable, filterable table of all configured IdPs. Each row contains:
- Alias: A user-defined name
- Type: OIDC or SAML
- Enabled: A toggle switch to activate or deactivate the IdP
- Actions: Delete icon
Only users with OWNER role (or PortX Techops team with support ticket) can add or modify IdPs.
PortX Configuration Information
When setting up your identity provider, you'll need to provide these PortX URLs and identifiers to your IdP administrator:
SAML Configuration
- Entity ID:
https://auth.piam.tenants.portx.io/realms/<your-tenant-name>/protocol/saml/descriptor - Redirect URL (ACS URL):
https://auth.piam.tenants.portx.io/realms/<your-tenant-name>/broker/<IDP-ALIAS>/endpoint- Replace
<IDP-ALIAS>with the alias you choose when creating the IdP
- Replace
OIDC Configuration
- Discovery Endpoint:
https://auth.piam.tenants.portx.io/realms/<your-tenant-name>/.well-known/openid-configuration
Copy these URLs and provide them to your identity provider administrator when configuring PortX as a service provider in your IdP system.
Finding Your Identity Provider Configuration
To configure PortX with your identity provider, you'll need specific URLs and metadata from your IdP. Here's where to find them for common providers:
SAML Providers
Microsoft Azure AD
- Discovery Endpoint URL:
https://login.microsoftonline.com/<TenantDomainNameOrID>/FederationMetadata/2007-06/FederationMetadata.xml- Replace
<TenantDomainNameOrID>with your Azure tenant domain or ID - Example:
https://login.microsoftonline.com/contoso.com/FederationMetadata/2007-06/FederationMetadata.xml
- Replace
Okta
- Discovery Endpoint URL:
https://<yourOktaDomain>/app/<appid>/sso/saml/metadata- Replace
<yourOktaDomain>with your Okta domain - Replace
<appid>with your SAML application ID - Example:
https://dev-12345.okta.com/app/abc123/sso/saml/metadata
- Replace
OIDC Providers
Okta
- Discovery Endpoint:
https://<your-okta-domain>.okta.com/oauth2/default/.well-known/openid-configuration- Replace
<your-okta-domain>with your Okta domain - Example:
https://dev-12345.okta.com/oauth2/default/.well-known/openid-configuration
- Replace
Microsoft Azure AD
- Discovery Endpoint:
https://login.microsoftonline.com/<tenant-id>/v2.0/.well-known/openid-configuration- Replace
<tenant-id>with your Azure tenant ID
- Replace
If you're using a different identity provider, look for their SAML metadata XML document or OIDC discovery endpoint (usually at /.well-known/openid-configuration).
Adding a New Identity Provider
Click ADD IdP to open a modal with two tabs: OIDC and SAML. Each tab has a form for configuring a new IdP.
OIDC Tab
The OIDC form includes:
- Basic Settings:
- Alias: A unique identifier for this IdP within PortX
- Display Name: The name shown to users during login
- Display Order: Controls the order of IdP buttons on login page
- PKCE & Signature Options:
- Enable PKCE: Enhanced security for OAuth flows
- JWKS URL or public key options: For token signature validation
- OAuth Settings:
- Authorization URL: Where users are redirected for authentication
- Token URL: Where PortX exchanges authorization codes for tokens
- UserInfo URL: Where PortX retrieves user information
- Client Config:
- Client ID: Your application's identifier in the IdP
- Client Secret: Your application's secret (if required)
- Authentication method: How PortX authenticates with the IdP
- Scopes: Comma-separated string specifying requested permissions
- Common scopes:
openid,email,profile
- Common scopes:
Discovery Endpoint: Use this to automatically prefill the OAuth settings above
- Enter your IdP's discovery endpoint URL (see provider configuration section)
- Example:
https://your-idp.com/.well-known/openid-configuration
- Create an OIDC application in your IdP with the PortX redirect URL
- Use the discovery endpoint to automatically populate most fields
- Enter your Client ID and Client Secret from your IdP application
- Adjust scopes based on what user information you need
SAML Tab
The SAML form includes:
- Basic Settings:
- Alias: A unique identifier for this IdP within PortX
- Display Name: The name shown to users during login
- Display Order: Controls the order of IdP buttons on login page
- SAML Configuration:
- Entity ID: Your IdP's unique identifier (found in IdP metadata)
- SSO URL: Where PortX sends authentication requests
- Logout URL: Where PortX sends logout requests
- Certificates: Public certificates for signature verification
- Signature & Encryption settings: Security configuration options
- Discovery: Automatically populate settings from a metadata descriptor URL
- Use the discovery endpoint URLs from the provider configuration section above
- Advanced Settings: Attribute handling, authentication settings, principal definitions
- First, provide your IdP administrator with the PortX URLs from the PortX Configuration Information section
- Once your IdP is configured, use the Discovery URL to automatically fill most SAML fields
- If discovery doesn't work, manually copy the required values from your IdP's metadata
Editing an Identity Provider
Click on any provider row to open the Edit IdP modal. It contains:
- Edit IdP tab with a prefilled form (similar to Add flow)
- Manage Mappers tab to manage attribute mappings between IdP claims and user attributes
Managing Mappers
Each IdP can have associated mappers that transform IdP claims or attributes into internal user properties.
Editing a Mapper
From the Manage Mappers tab:
- Click a mapper name to edit it
- Change key-value pairs where:
- OIDC:
claim → user.attribute - SAML:
attribute.name → user.attribute
- OIDC:
Enabling/Disabling a Provider
Use the toggle switch under the Enabled column in the table to activate or deactivate a provider. The action updates the server immediately and shows a success or error notification.
Deleting a Provider
Click the trash icon. You will be prompted for confirmation. On success, the provider is removed from the list.
Troubleshooting Common Issues
Can't Find Required URLs
Problem: You can't locate the Entity ID, Redirect URL, or discovery endpoints mentioned in your IdP documentation.
Solutions:
- PortX URLs: All PortX URLs are listed in the PortX Configuration Information section above
- IdP URLs: Check the Finding Your Identity Provider Configuration section for provider-specific URL patterns
- Contact your IdP administrator if you can't access the metadata or configuration pages
Discovery Endpoint Not Working
Problem: The automatic discovery feature fails to populate fields.
Solutions:
- Verify the discovery URL is accessible from your network
- Check if the URL returns valid JSON/XML metadata
- Manually copy values from your IdP's configuration if discovery fails
- Ensure you're using the correct discovery endpoint format for your provider
SAML Configuration Errors
Problem: SAML authentication fails or returns errors.
Solutions:
- Verify the Entity ID matches exactly between PortX and your IdP
- Ensure the Redirect URL (ACS URL) is configured correctly in your IdP
- Check that certificates are valid and properly formatted
- Confirm signature and encryption settings match between both systems
OIDC Authentication Issues
Problem: OIDC login fails or returns authorization errors.
Solutions:
- Verify Client ID and Client Secret are correct
- Ensure redirect URLs are properly configured in your IdP application
- Check that requested scopes are available and authorized
- Confirm your IdP application allows the authentication flow type being used
Access Denied or Missing Information
Problem: You don't have access to your IdP's configuration or can't find required metadata.
Solutions:
- Contact your identity provider administrator
- Request access to the IdP administration console
- Ask for the specific URLs and configuration details listed in this documentation
- If using a managed service, check your provider's documentation portal
Best Practices
- Use Discovery Endpoints: When available, auto-fill fields to minimize manual errors.
- Use Meaningful Aliases: Alias names should clearly identify the purpose or source of the IdP.
- Validate Certificates & URLs: Ensure that all URLs (auth, token, logout) are valid and reachable.
- Assign Default Roles Carefully: Enabling default roles can affect user permissions—review this setting thoughtfully.
- Test Before Enabling: Always validate configurations with test users before making an IdP active.
This documentation provides a comprehensive guide to managing identity providers effectively. Follow the outlined steps and best practices to ensure secure, scalable, and maintainable authentication integrations within your organization.