Identity Providers

Microsoft Azure Active Directory is now Microsoft Entra ID

Nintex Automation supports using different Identity Providers (IdPs) that you can use to authenticate and authorize users in your environment. For example, you may have a repository of user accounts in Google, and you want these users to use their Google logins to authenticate against and use your environment.

There are two main aspects for Identity Providers in Nintex Automation:

  • Provisioning of user information from an identity store to the product.
    The product leverages the System for Cross-domain Identity Management (SCIM) specification to provision/retrieve user information from SCIM 2.0-compliant IdPs that support OAuth Bearer tokens. Using SCIM to synchronize user identities from your identity store to the product requires that you implement a SCIM provider application that calls the K2 SCIM endpoint. For reference information to create a SCIM provider to pass user identity information to the K2 SCIM endpoint, see the SCIM integration with an Identity Provider: Manual/Custom approach and the SCIM API Reference topics.
  • Authenticating users when they log in to applications.
    The product leverages OpenID Connect (OIDC), which is an authentication layer on top of OAuth 2.0. This mechanism allows the product to authenticate users against IdPs that support OIDC.

While the product uses OIDC OAuth flow, it does not support every authentication provider supported by OIDC.

For more on the architecture of Identity Providers in the product, please see the topic Identity Providers Architecture.

  • To configure an Identity Provider for your Nintex Automation environment:
    1. Use the OIDC preview feature to configure your environment. As part of this process, you need the following information for an 'admin' user for your IDP:
      • The name of the Identity Provider (e.g. Google, Azure Active Directory, etc.)
      • For Okta, create an app in Okta to provide the following information:
        • Client secret
        • Client ID
        • Authority (Issuer Domain)
    2. See the topic SCIM integration with an Identity Provider: Manual/Custom approach for more information on how to build the SCIM application. Note that other users will only be able to authenticate with the product once the initial user synchronization has completed, and the SCIM application should send updated user information to the product as necessary to keep user information synchronized.

    Considerations

    • SharePoint OnPrem/Online login with K2 configured using OIDC not supported

    • K2 Mobile Workspace (API authentication limitations)