To confirm the validity of a client application, you can configure client
authentication. This process ensures that the client application is legitimate and authorized to
interact with Security Center.
What you should know
You can authenticate a client application in one of the following ways:
- Client Secret
- A confidential password issued by the identity provider when Security Center is
registered as a confidential client.
- Certificate
- Certificates serve as a secret to verify the application's identity during the sign in
process.
NOTE: In Security Center, client authentication is available only
for the OpenID Connect protocol.
Whenever possible, use certificate credentials
instead of client secrets, as certificate credentials offer several advantages:
- The risk of client impersonation is reduced because the signing is done internally or
by a trusted authority.
- The identity provider doesn't need to store client credentials, such as client secrets
or private keys.
- The expiration of the client assertion is controllable.
- The client must prove it holds the private key by signing the client assertion.
Enabling Proof Key for Code Exchange (PKCE) helps prevent
cross-site request forgery and authorization code injection attacks. Although PKCE isn't
designed for client authentication, it ensures that the same client initiates the request
and completes the authorization process after client authentication.
Procedure
To configure client authentication using a client secret:
-
Prepare the identity provider application in Microsoft Entra ID or Okta.
During the Microsoft Entra ID configuration, copy the client secret and keep it safe
until the integration is complete. It’s impossible to retrieve a client secret from the
Microsoft Entra ID configuration. If the secret is lost, you must generate a new
one.
-
In Config Tool, select the Authentication Service role created earlier and click
Configuration.
-
On the Client authentication page, turn on Confidential
client to set Security Center as a confidential client of this identity
provider.
-
Select Client Secret from the list of client authentication
methods.
-
In the Client secret field, enter the client secret that was
copied from the Certificates & secrets page during the Microsoft
Entra ID configuration.
-
Click to exit the configuration or click Next to
continue.
To configure client authentication with Microsoft Entra ID using a
certificate
-
Prepare the identity provider
application in Microsoft Entra ID.
-
In Config Tool, select the Authentication Service role created earlier and click
Configuration.
-
On the Client authentication page, turn on the
Confidential client option to set Security Center as a
confidential client of this identity provider.
-
Select Certificate from the list of client authentication
methods.
The list of Directory Servers with an option to copy the certificate appears.
-
Click the Copy Certificate button that corresponds to the main
directory server.
-
Click Copy certificate to file and save the file to your local
computer.
-
Go to the application page in Microsoft Entra ID, and click .
-
In the Certificates tab, click Upload
certificate.
-
Select the certificate file, enter a description, and click
Add.
-
Return to the configuration wizard of the Authentication Service role in Config
Tool.
-
Click Verify current Directory certificate.
NOTE: You can only verify the main directory certification, not the
failover directories.
-
Click to exit the configuration or click Next to
continue.
To configure client authentication with Okta using a certificate
-
Prepare the identity provider
application in Okta.
-
In Config Tool, select the Authentication Service role created earlier and click
Configuration.
-
On the Client authentication page, turn on the
Confidential client option to set Security Center as a
confidential client of this identity provider.
-
Select Certificate from the list of client authentication
methods.
The list of Directory Servers with an option to copy the certificate appears.
-
Click the
Copy
Certificate button that corresponds to the main directory
server.
-
Click Copy certificate public key to clipboard.
-
Go to the General page of your application in Okta, click
Edit in the Client Credentials section, and
select Public key / Private key as the client authentication
method.
-
In the PUBLIC KEYS section, select the Save keys in
Okta option and click Add key.
-
In the Add a public key window, paste the certificate public key
and click Done.
-
(Optional) Select the Require PKCE as additional verification
option.
-
Click Save.
-
Return to the configuration wizard of the Authentication Service role in Config
Tool.
-
Click Verify current Directory certificate.
NOTE: You can only verify the main directory certification, not the
failover directories.
-
Click to exit the configuration or click Next to
continue.