Configure Enterprise Security
You can enable single sign-on with OpenID Connection (OIDC) authentication for Azure or Okta.
The ability to view or edit certain settings is determined by a user's privileges. All necessary privileges are included in the Administrator role by default. You must belong to the System Administrators group to use this feature.
- Open the Workstation window.
In the Navigation pane, click Environments.
- Right-click an environment and choose Configure Enterprise Security.
- In step 1, select an Azure or Okta as the identity provider.
- In step 2, click View configuration instruction to view a step-by-step configuration guide. Use the instructions to complete steps 2 and 3.
- If you need assistance from your administrator that is in charge of enterprise Identity and Access Management (IAM), click Request access from your administrator.
In step 4, configure the following settings for IAM user mapping...
User Claim Mapping Expand to enter OIDC claims to identify users and display their info.
Primary User Identifier Enter the OIDC claim used to identify users. By default, the OIDC claim is email.
Login Name: Enter the OIDC claim for the login name. By default, the OIDC claim is name.
Full name Enter the OIDC claim used for display users’ full names in MicroStrategy. By default, the OIDC claim attribute is name.
Email Enter the OIDC claim used as the user's email in MicroStrategy. By default, the OIDC claim attribute is email.
Advanced Expand to enter advanced user mapping settings.
Import User at Login Activate this toggle to allow users from your active directory to use their credentials to log in to MicroStrategy.
In step 5, if Okta is selected as the identity provider, click Test Configuration to test with the credentials you provided above.
- Access the Library Admin page to complete additional steps before OIDC authentication takes effect.