6.5 Using external identity providers for the self-service applications

You can configure MyID to set up an external OpenID Connect identity provider (for example, Microsoft Entra or Google) to provide authentication to the MyID Self-Service App, the MyID Client for Mac, or the MyID Client for Windows.

You can then use the external identity provider to provide authentication to MyID when you collect a job or start the Change Security Phrases or Reset My PIN operations.

Note: This feature requires the MyID Self-Service App version SSP-3.21.1000.1 or later, the MyID Client for Mac version 3.0.0 or later, or any version of the MyID Client for Windows.

6.5.1 Configuring the MyID web.oauth2 server for external identity providers

You must configure your external identity provider (for example, Microsoft Entra), then configure the web.oauth2 server to recognize the external system as an external identity provider.

For details, see section 6, Setting up an external identity provider.

Note: You can configure your system for multiple external identity providers. Each configured external identity provider appears in the list of options within the Self-Service App. Note, however, that you can restrict the list of external identity providers available for the Self-Service App; see the AllowedLogonMechanismIds option in section 6.5.4, Configuring the MyID web services for external identity providers.

6.5.2 Configuring the logon priority for external identity providers

You can specify the priority of the available logon mechanisms, including external identity providers.

See the Logon Priority page (Security Settings) section in the Administration Guide for details.

6.5.3 Configuring the credential profile self-service unlock settings for external identity providers

You can include the External Logon authentication method in the list of available authentication methods specified in the credential profile for self-service unlock.

See the Self-Service Unlock Authentication section in the Administration Guide for details.

6.5.4 Configuring the MyID web services for external identity providers

You must edit the myid.config file for the MyIDProcessDriver web service to specify the allowed hosts and allowed logon mechanisms. By default, this file is on the web services server in the following folder:

C:\Program Files\Intercede\MyID\SSP\MyIDProcessDriver\

Add the following lines to the <MyIDSettings> section:

Copy
<add key="AllowedHosts" value="<urls>"/>
<add key="AllowedLogonMechanismIds" value="<logonids>"/>

where:

For example:

Copy
<MyIDSettings>
    ...
    <add key="AllowedHosts" value="https://myserver.example.com"/> 
    <add key="AllowedLogonMechanismIds" value="101,121"/> 
</MyIDSettings>

6.5.5 Configuring the delay for closing the browser logon window

When you click the link on the browser logon window to return to the Self-Service App, after a short delay, the browser window closes. This allows time for the browser logon window to inform the MyID web server that the authentication was successful.

If necessary, you can adjust the delay time:

  1. On the MyID web server, as an administrator, open the appsettings.Production.json file in a text editor.

    By default, this is:

    C:\Program Files\Intercede\MyID\web.oauth2\appsettings.Production.json

    This file is the override configuration file for the appsettings.json file for the web service. If this file does not already exist, you must create it in the same folder as the appsettings.json file.

  2. In the MyID section, edit the SsaLaunchWindowCloseDelay option.

    Copy
    "MyID": {
        "SsaLaunchWindowCloseDelay":  10000
    },

    If this option does not exist, you must add it.

    Set the value to the number of milliseconds you want to wait before closing the browser logon window. Setting this value too low may result in the MyID web server not receiving a notification that the authentication was successful.

    The default setting in the appsettings.json file is 10000 (10 seconds).

  3. Save the appsettings.Production.json file.
  4. Recycle the web service app pool:

    1. On the MyID web server, in Internet Information Services (IIS) Manager, select Application Pools.
    2. Right-click the myid.web.oauth2.pool application pool, then from the pop-up menu click Recycle.

    This ensures that the web service has picked up the changes to the configuration file.

6.5.6 Compatibility with older versions of MyID

This feature requires the MyID Self-Service App version SSP-3.21.1000.1 or later, the MyID Client for Mac version 3.0.0 or later, or any version of the MyID Client for Windows.

This also means that by default you cannot use this version of the Self-Service App with MyID servers older than MyID 12.12. If you need to use these versions of the self-service applications with MyID servers older than MyID 12.12, you must set a client-side configuration option.

See the Compatibility issues section in the Self-Service App guide, the Supported MyID versions section in the MyID Client for Mac guide, and the Supported MyID versions section in the MyID Client for Windows guide.

6.5.7 Troubleshooting external identity providers

You may see the following error messages when attempting to authenticate with external identity providers: