The following steps describe how to configure OIDC SSO in Microsoft Entra ID.  For more information, refer to Microsoft Entra seamless single sign-on.

Copy the Redirect URI for your iManage environment

Before you begin, copy the Redirect URI of your iManage environment. This URI is used to configure OIDC SSO in Microsoft Entra ID.

  1. In iManage Control Center, browse to Network & SecuritySingle Sign-On (SSO).

  2. Select Copy in the Redirect URI field of the OIDC Service Provider Settings section. Save the Redirect URI for use in section Configure SSO in Microsoft Entra ID.

Configure SSO in Microsoft Entra ID

Complete the following steps in Microsoft Entra ID to configure OIDC single sign-on:

  1. Sign in to Azure and browse to Microsoft Entra ID.

  2. In App Registration, select New registration.

NOTE: If switching from Security Assertion Markup Language (SAML) SSO to OIDC SSO in iManage Control Center, we recommend that you create a new registration in Microsoft Entra ID. Creating a new registration allows you to preserve your existing SSO registration and roll back to it if necessary.

  1. In the Name field, enter a name.

  2. Select Accounts in this organizational directory only.

  3. Leave Redirect URI (optional) set to Web, and either:

    1. Paste the value copied in Copy the Redirect URI for your iManage environment, or

    2. Enter the value in the form:
      https://cloudimanage.com/auth/oidc/callback/<customer-id>
      where <customer-id> is your customer tenant ID.

  4. Select Create.

  5. In the navigation panel on the left, select Authentication.

  6. Set Front-channel logout URL to:
    https://cloudimanage.com/auth/logout

  7. Browse to Overview and note the following values:

    1. Application (client) ID

    2. Directory (tenant) ID

  8. Select Endpoints at the top of the page and note the value for the following setting:
    OpenID Connect metadata document

  9. Select Certificates & Secrets > New client secret.

  10. In the Add a client secret frame, enter a value in Description, select a value in Expires, and select Add.

  11. Note the client secret Value in the Client secrets window.

Copy settings to iManage Control Center

Several values from the Microsoft Entra ID OIDC SSO configuration are used to configure OIDC SSO in Control Center. The following table provides a mapping between the Microsoft Entra ID values and the values used to configure OIDC in Control Center. The step numbers refer to the step in Configure SSO in Microsoft Entra ID where the value is found.

Table: OIDC SSO configuration value mapping

OIDC SSO Configuration in Microsoft Entra ID

OIDC SSO Configuration in Control Center

Application (client) ID (from Step 9a)

Client ID

OpenID Connect metadata document (from Step 10)

Discovery Endpoint URL

This is a value of the form:

https://login.microsoftonline.com/<DirectoryID>/v2.0/.well-known/openid-configuration

NOTE: In the sample URL, "<DirectoryID>" represents the "Directory (tenant) ID" value identified in Step 9b of Configure SSO in Microsoft Entra ID.

Client secrets Value (from Step 13)

Client Secret Value

Customer Logout API Endpoint URL

This is a value of the form:

https://login.microsoftonline.com/<DirectoryID>/oauth2/v2.0/logout

NOTE: In the sample URL, "<DirectoryID>" represents the "Directory (tenant) ID" value identified in Step 9b of Configure SSO in Microsoft Entra ID.

Return to iManage Control Center and complete the steps in Enable OIDC SSO using the values from the above table.