Skip to main content
All CollectionsIntegrations
Step 1: Configure the identity provider for OIDC group mapping
Step 1: Configure the identity provider for OIDC group mapping

Identity provider pre-requisites for configuring group mapping in Dispel

P
Written by Pete Pickerill
Updated this week

Follow the instructions below to configure Dispel and your identity provider to support OIDC group mapping.

Supported Identity Platforms

  • Microsoft Entra

Set up single sign on (SSO) for Dispel in the identity provider

In order to retrieve a user's group membership from the identity provider, the user must authenticate using single sign on using that identity provider. Refer to the articles below to set up single sign on in Microsoft Entra or Okta.

Configure the identity provider to return group claims

Group claims are lists of identity provider groups a user belongs to that are included in the authorization token returned by the identity provider when a user successfully authenticates. Group claims are not included in the authorization token by default, so additional configuration in the identity provider is required. Consult the instructions below to enable and configure group claims.

Microsoft Entra group claim configuration

Configuring Microsoft Entra ID (formerly Azure AD) for OIDC group mapping involves setting up your application to read group claim and then configuring the application to interpret these claims for authorization purposes. Expand the sections below to see step by step configuration instructions.

  • Step 1: Configure Group Claims for the Application

    1. Go to the Application Settings:

      1. In the MS Entra application you registered for Dispel, go to “Token configuration.”

    2. Add Group Claims:

      1. Click “Add groups claim.”

      2. Specify the types of groups to include in the token (e.g., “Security groups,” “Directory roles,” or “All groups”).

      3. Choose whether to include group names, group IDs, or both, depending on your application’s needs.

      4. Decide whether to include groups in the id_token, access_token, or both.

      5. If your app is multi-tenant, please be sure to add a fallback for groups when the maximum limit of groups in a token is reached.

    3. Save Changes: After setting the group claim options, click “Save.”

  • Step 2: Configure API Permissions

    1. Go to API Permissions:

      1. Under “API Permissions,” add required permissions for your application to read group information.

    2. Add Microsoft Graph Permissions:

      1. Click “Add a permission.”

      2. Select “Microsoft Graph” as the API.

      3. Under “Delegated permissions” or “Application permissions,” add permissions like Group.Read.All if your app requires direct access to read groups.

    3. Grant Admin Consent: Once permissions are configured, click “Grant admin consent” for these permissions to avoid users individually consenting.

For detailed guidance, refer to Microsoft’s documentation on configuring group claims for applications.

Okta group claim configuration (Okta support coming soon!)

To include group information in tokens issued by Okta, you can configure group claims in the Org Authorization Server. The Org Authorization Server is suitable for scenarios where you need to include group claims in ID tokens for Single Sign-On (SSO) purposes.

  • Step 1: Navigate to the Application in Okta

    1. In the Okta Admin Console, go to Applications > Applications.

    2. Select the OpenID Connect (OIDC) client application you want to configure.

  • Step 2: Configure the Group Claim:

    1. Go to the Sign On tab and click Edit in the OpenID Connect ID Token section.

    2. In the Group claim type section, choose either Filter or Expression:

      1. Filter: Select this to include groups based on specific criteria. For example, to include all groups, set the filter to “Matches regex” and enter .*.

      2. Expression: Use Okta Expression Language to define custom logic for including groups.

    3. Click Save to apply the changes.

  • Step 3: Refresh Application Data

    1. Return to the Applications list.

    2. From the More button dropdown menu, select Refresh Application Data to ensure the changes take effect.

For detailed guidance, refer to Okta’s documentation on customizing tokens with a groups claim.

Next Steps

Did this answer your question?