Configuring Single Sign-On in Specification Compliance Manager
- Updated2022-05-23
- 2 minute(s) read
Configuring Single Sign-On in Specification Compliance Manager
Specification Compliance Manager supports single sign-on (SSO) solutions that use OpenID Connect for user authentication across multiple applications. This functionality enables usage of several common SSO providers including PingFederate, Azure ADFS, and Okta. Refer to the OpenID Connect Certifications documentation for a full list of certified SSO providers.
- Configure a DNS name for the Specification Compliance Manager server.
- Ensure that the local machine has administrator-level access to the Specification Compliance Manager server.
- Set up an OpenID Connect provider server for OpenID Connect authentication.
- Log in to the Specification Compliance Manager server and navigate to: %PROGRAMFILES%\National Instruments\Shared\Web Server\conf\openidc
- Add the configuration files for your OpenID Connect provider to the openidc folder.
- Open NI Web Server Configuration.
- Open the Authentication tab and enable Use OpenID Connect (advanced).
- Click Apply and restart.
OpenID Connect Provider Configuration Files
for Specification Compliance Manager Server
The Specification Compliance Manager server requires three configuration files to enable OpenID Connect provider authentication for user accounts. Refer to the following list for a definition of each file, where URL is the URL-encoded fully qualified domain name for the OpenID Connect provider.
Specification Compliance Manager relies on SystemLink functionality to enable support for SSO solutions. Refer to the Single Sign-on with OpenID Connect section of the SystemLink Operations Handbook for more information, including a list of supported encryption algorithms and references to relevant OpenID Connect provider documentation.