Skip to content

OIDC Management Login

Reference: https://docs.pexip.com/admin/managing_admin_oidc.htm

  1. Access Microsoft Entra Privileged Identity Management and navigate to Tasks > My Roles in the blade.
  2. From the My Roles screen, access Activate > Microsoft Entra Roles from the blade.
  3. Activate the Application Administrator role.
    • This will trigger an MFA validation.
  4. Navigate to Microsoft Entra ID.
  5. Select Manage > App registrations

Under All Applications are the Pexip-related application registrations. These allow Pexip to be configured to access Entra as an identity provider.

Within each is a Client Secret entitled “Pexip Administration OICD client secret” which contains the secret value configured in the Pexip management interface.

Application NameApplication (Client) ID
Verify-by-Video Platform - Test - Pexip Administration OICD33758b54-a9cb-48ef-a363-5aaf10888f80
Verify-by-Video Platform - Prod - Pexip Administration OICD849cca37-34d6-42d9-bb7d-4d8592b385c5

The Authentication source is currently set to: OpenID Connect service, which requires a correct OpenID Connect configuration. If any changes are made to configuration that present some risk of interfering with connectivity between Entra ID and Pexip, admininstrators can change this to Local Database, and use the same username and password combination as was in use prior to v35’s introduction of OIDC administrator login. That username and password are in the kvlt-maxconf-test (for Test) or kvlt-maxconf-prod (for Production) Azure Keyvaults as the values for variables named pexip-user and pexip-pass.

Local Database should be disabled when not in use, and OpenID Connect service left as the only authentication option to ensure that Pexip access cannot be illegitimately granted without our corporate Entra ID service having first been compromised.

In the Pexip management web application, the OpenID Connect configuration section under Users & Devices > Administrator Authentication has the values for their respective app registration configured according to the Pexip documentation.

OpenID Connect configuration fieldValue
Metadata URLthe OpenID Connect metadata document value taken from the Endpoints panel in the App registration overview.
Client IDthe Application (client) ID from the App registration overview.
Authentication methodClient secret
Client secretAs configured under Management > Certificates & secrets per Pexip’s documetation
Scopeopenid email profile GroupMember.Read.All offline_access
Username fieldpreferred_username
Groups fieldgroups
Required key
Required value
Login button text

First, an administrator role called “Read-write” must exist under Users & Devices > Administrator Roles. It should be granted all available permissions.

Next, in Users & Devices > Role Mapping we map an Entra ID Group to a Role in Pexip, granting OIDC logins for users in a particular Entra ID Group to inherit the complete set of administrative permissions provided by the Role created in the previous step.

The Entra ID role we have used to configur Pexip is (found in Azure under Microsoft Entra ID > Groups):

  • Azure Roles - Maximus Conferencing Developers,
  • with Object ID: d48429bd-9f2a-47a2-a410-993f2a37876b.

The role mapping in Pexip has the following configuration:

Role Mapping fieldValue
NameAzure Roles - Maximus Conferencing Developers
SourceOpenID Connect
Valued48429bd-9f2a-47a2-a410-993f2a37876b
RolesRead-write