Creating an OpenID Connect authorization realm
You can create an OpenID Connect (OIDC) authorization realm to use Microsoft Entra ID or Okta server for authorization.
Procedure
- On the server, click . The Create Authorization Realm dialog box opens.
- Enter a name in the Name field.
- Ensure that OIDC is selected in the Type list.
-
Select any of the following vendors:
Table 1. OIDC Vendors Vendor name Description Microsoft Entra ID To enable Application Role validation through the rolesclaim, the Microsoft Entra ID authorization realm requires specific configuration. You must ensure that the Entra ID manifest is set torequestedAccessTokenVersion: 2and that the application is exposed as an API. Finally, you must map the resulting API ID as a designated scope within the Deploy authentication realm settings.Okta To enable group-based authorization, the Okta realm validates the groupsclaim within the security token. This action requires a dedicated authorization server to be defined in Okta. Additionally, configure the application's authentication realm with the specific Issuer and associated endpoints provided by that authorization server. - Click Save.