MicroStrategy ONE

Enable Single Sign-On with OIDC Authentication

Starting in MicroStrategy ONE (December 2024), you can add system prompt mapping and nested groups to your OIDC authentication. This additional customization provides more granular control over user access and improves the overall security and usability of your system.

You can enable single sign-on with OpenID Connection (OIDC) authentication for Azure, Okta, and more.

The ability to view or edit certain settings is determined by a user's privileges. All necessary privileges are included in the Administrator role by default. You must belong to the System Administrators group to use this feature.

See Enable Single Sign-On with OIDC Authentication in the System Administration Help for more details.

  1. Open the Workstation window.
  2. In the Navigation pane, click Environments.

  3. Right-click an environment and choose Configure Enterprise Security > OIDC.
  4. In Step 1: Name the Configuration, type a name.
  5. In Step 2: Select an identity provider, select an identity provider.
  6. In Step 3: Identity Provider Configuration, click View configuration instruction to view a step-by-step configuration guide. Use the instructions to complete steps 3 and 4. Starting in MicroStrategy 2021 Update 10, if your IdP supports single logout, you can enable it using Enable Single Logout with OIDC Authentication.
  7. If you need assistance from your administrator that is in charge of enterprise Identity and Access Management (IAM), click Request access from your administrator.
  8. If Okta is selected as the identity provider, in Step 6: Test Configuration, click Test Configuration to test with the credentials you provided above.

  9. Click Save.

  10. Access the Library Admin page to complete additional steps before the OIDC authentication takes effect.