Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
The Microsoft Entra ID connector uses OpenID Connect to federate authentication with Microsoft Entra ID and supports standard OIDC flows — allowing you to bridge Microsoft Entra ID with applications that don’t natively support modern identity protocols.Use Cases
- Unify SSO across hybrid environments — Extend Microsoft Entra ID authentication to legacy and on-premises applications that don’t support modern protocols, creating seamless SSO across your entire hybrid estate
- Rationalize identity platforms — Consolidate redundant identity providers onto Microsoft Entra ID by orchestrating gradual user migration without disrupting access to existing applications
- Identity resilience and failover — Configure Microsoft Entra ID as a primary or secondary IdP with automatic failover routing, ensuring authentication continuity if another provider experiences an outage
- Bridge on-premises Active Directory — Connect on-premises AD (synced via Entra ID Connect) with cloud applications through OIDC federation, unifying access across directory boundaries
Setup
- Console UI
- Configuration
To create a Microsoft Entra ID (OIDC) connector in the Maverics Console:
- Navigate to Identity Fabric in the Console sidebar.
- Click Create and select Microsoft Entra ID (OIDC).
- Enter a Name — this is the friendly name that identifies your provider.
- Enter the OIDC Well Known URL — for Microsoft Entra ID, this follows the pattern
https://login.microsoftonline.com/{tenant-id}/v2.0/.well-known/openid-configuration. Replace{tenant-id}with your Microsoft Entra ID directory (tenant) ID from the Azure portal. Use the v2.0 endpoint for standard OIDC support. - Enter the OAuth Client ID — the Application (client) ID from your Entra ID app registration in the Azure portal.
- Enter the OAuth Client Secret — the client secret from your Entra ID app registration.
- Under Redirect URLs, add the callback URL where Entra ID will redirect after authentication. This URL must match a Redirect URI configured in the app registration under Authentication.
- Optionally configure Logout Callback URLs for single logout support.
- Optionally set Scopes (space-separated). Default scopes are typically
openid profile email. - The PKCE toggle is enabled by default. Disable it only if your Entra ID app registration is not configured to support Proof Key for Code Exchange.
- Optionally enable Offline Access for token refresh support (Proxy apps only).
- Optionally configure Error Handling rules to redirect users based on errors returned by the IdP during the OIDC callback. See Callback Error Handling for details.
- Click Save.
Callback Error Handling
When Microsoft Entra ID returns an error during the OIDC callback (e.g., the user forgot their password in an Azure AD B2C flow, or cancelled login), the Orchestrator can evaluate configurable rules to redirect the user to a specific URL based on the error. Rules are evaluated in order — the first matching rule wins. You can match on theerror or error_description callback parameters using exact or substring matching. A default catch-all rule can be included to handle any unmatched errors.
- Console UI
- Configuration
In the connector’s Error Handling section:
- Click Add Rule to create a new error handling rule.
- Select a Match On value — either Error or Error Description — to choose which OIDC callback parameter to match against.
- Select a Match Type — either Contains (substring match) or Equals (exact match).
- Enter the Match Value — the string to match against the selected callback parameter (e.g.,
AADB2C90118for Azure AD B2C password reset flows). - Enter the Redirect URL — the URL to redirect the user to when this rule matches.
- Optionally check Default to make a rule the catch-all for any unmatched errors. A default rule does not require Match On, Match Type, or Match Value fields. Only one default rule is allowed.
- Drag rules to reorder them — rules are evaluated top to bottom and the first match wins.
- Click Save.
Troubleshooting
- Verify the
oidcWellKnownURLis accessible from the Orchestrator host — ensure the tenant ID is correct and the v2.0 endpoint is used - Ensure the
oauthRedirectURLmatches exactly what is registered in the Microsoft Entra ID app registration under Authentication > Redirect URIs - Check that the client secret reference resolves correctly via your secret provider — Microsoft Entra ID client secrets expire and need periodic rotation
Related Pages
Identity Fabric
Overview of all identity providers
Okta
OIDC connector for Okta
Generic OIDC
Generic OpenID Connect connector
ADFS
OIDC connector for ADFS