Configure OpenID Connect Identity Provider

MariaDB Enterprise Manager can be integrated with external identity providers (like Okta, Keycloak, or Azure AD) using OpenID Connect (OIDC). This allows you to centralize user authentication, enforce your organization's security policies, and enable single sign-on (SSO).

Integrating with an external Identity Provider is an optional feature. MariaDB Enterprise Manager includes a built-in user management system that works out-of-the-box.

Before You Begin

Before configuring OIDC in Enterprise Manager, you must first register Enterprise Manager as a client application within your Identity Provider's administrative console and obtain the necessary credentials.

1

Configure client settings in your identity provider

In your Identity Provider's client configuration screen, you will need to provide several URLs that point back to your MariaDB Enterprise Manager instance. These URLs tell the provider where to send the user after authentication and what origins are allowed to make requests.

While the exact field names may vary, you must configure the following endpoints, replacing <Your_Enterprise_Manager_Address> with the actual address of your instance:

  • Root / Home URL: https://<Your_Enterprise_Manager_Address>:8090

  • Valid Redirect URI: https://<Your_Enterprise_Manager_Address>:8090/landing

  • Valid Post Logout Redirect URI: https://<Your_Enterprise_Manager_Address>:8090/

  • Web Origins: https://<Your_Enterprise_Manager_Address>:8090

2

Obtain your credentials

Once the client application is saved in your Identity Provider, find and copy the following values:

  • Authentication URL: The provider's endpoint for authentication requests.

  • Client ID: The unique ID for the Enterprise Manager application.

  • Client Secret: The secret key for the Enterprise Manager application.

3

Configure role mapping in your identity provider

Finally, you must configure your Identity Provider to pass the user's role in the JWT token. This is explained in the "Mapping IDP Roles" section further down this page.

Configuration Steps in Enterprise Manager

1
  • From the main UI, click the Settings icon (⚙️) in the left navigation bar.

  • On the Settings page, click the Identity Provider card.

2

Enter your OIDC provider details

On the OpenID Connect (OIDC) configuration page, fill in the details from your provider:

  • Authentication URL: The full URL for your OIDC provider's authentication endpoint.

  • Authentication Flow: Choose the OIDC flow. auto is the default and recommended for most providers.

  • Client ID: The Client ID you obtained from your provider.

  • Client Secret: The Client Secret you obtained from your provider.

3

Save the configuration

  • Click the Save button to apply the settings.

Mapping IDP Roles to Enterprise Manager Permissions

For Enterprise Manager to assign the correct permissions to a user logging in via OIDC, it expects the JWT token from your provider to contain a specific field (claim) named account.

The value of this account field must exactly match the name of a role that exists in MariaDB Enterprise Manager (for example, admin, viewer, or a custom role).

1

Resetting the OIDC Configuration

To restore the default settings:

  1. Click the Reset Configuration button.

  2. In the confirmation dialog, click Reset.

2

A success message will confirm the reset.

This page is: Copyright © 2025 MariaDB. All rights reserved.

Last updated

Was this helpful?