Single Sign-On in Content Fusion Enterprise
Oxygen Content Fusion Enterprise Server supports Single Sign-On by configuring a provider that supports the OpenID Connect protocol such as Microsoft Entra ID or Okta.
Note:
Content Fusion uses the email address provided by the Single Sign-On
provider, unless the
email_verified
field is false
for a
particular user. To enable Single Sign-On:
- Define a new application in the administration interface of your
OpenID Connect provider to represent your Oxygen Content Fusion Enterprise Server deployment:
- When you are asked for a redirect URI, use the following value:
https://<content-fusion-address>/api/oauthc/oidcId/callback
where you replace<content-fusion-address>
with the actual address of your server. - After you define the application, you need to note the Client ID (or Application ID in some cases) and Client Secret that will be generated for you.
- When you are asked for a redirect URI, use the following value:
- On the machine where Content Fusion is installed, go to the Administration Page. In the
Single Sign-On Authentication section, enable the Use
OIDC single sign-on option and configure the fields listed there.For Okta:
- Provider Name - Enter OKTA.
- To retrieve the authorization, token, and
user info endpoints, append
/.well-known/openid-configuration
to the Issuer URI of your Authorization Server. You can find the Issuer URI in .For example, your discovery URL might look like:
https://<okta-subdomain>.okta.com/oauth2/<authorizationServerId>/.well-known/openid-configuration
where you must replace
<okta-subdomain>
with your Okta domain, and<authorizationServerId>
with the actual ID of your Authorization Server. - Client ID - Enter the Client ID (or Application ID in some cases) that was generated in step one.
- Client Secret - Enter the Client Secret that was generated in step one.
For Entra ID:
- Provider Name - Enter EntraID.
- To retrieve the authorization, token, and user
info endpoints, use:
https://login.microsoftonline.com/<tenant-id>/v2.0/.well-known/openid-configuration
, where you must replace<tenant-id>
with the Directory (tenant) ID from your registered application's overview in Azure Portal. - Client ID - Enter the Client ID (or Application ID in some cases) that was generated in step one.
- Client Secret - Enter the Client Secret that was generated in step one.
- Make sure you click Save Configuration when you are finished.
- Restart the Content Fusion
machine.
sudo bash /fusion/admin/stop-content-fusion.sh sudo bash /fusion/admin/start-content-fusion.sh
Result: Users will now have the option to log on to Content Fusion using the OpenID Connect provider.