Add multiple users via IDP

 

Applicable for users with an Enterprise-Cloud license. 

The IDP user provider allows the owner of the organization to create users for that organization using an identity management system that supports OpenID Connect (e.g., Microsoft Azure Active Directory). This way, you can set up IDP in my.anydesk II and users from your organization will be able to log in with SSO using the organization's ID and their company credentials. 

Prerequisites
Configure IDP
Set up IDP Mapper

In this chapter, you will learn what prerequisites are needed for IDP setup, how to configure IDP via the my.anydesk management console, and how to set up an IDP mapper. 

For more information about user provider types, see User Providers.


Prerequisites

Before configuring IDP in my.anydesk II, you need to set up your identity provider first. You can use any third-party identity provider that supports OpenID Connect such as Microsoft Azure Active Directory.

For IDP configuration in my.anydesk II, you will need the following data: 

  • Client Secret. Copy and paste the URL to the Client Secret field when configuring IDP Setup.
  • Application (Client ID). Copy and paste the URL to the Client ID field.
  • Authorization endpoint. Copy and paste the URL to the Authentication URL field.
  • Token endpoint. Copy and paste the URL to the Token URL field.

top_button-1


Configure IDP

You need to configure IDP to create a connection between my.anydesk II and your identity provider.

❗  You will not be able edit users in my.anydesk II created through the IDP since they are synchronized with the identity provider.  

To configure IDP in my.anydesk II:

  1. Open my.anydesk II and go to Organization
  2. In the General section, click Edit, and in the User Provider field, select IDP
  3. In the Switch active provider window, select Proceed.
  4. Scroll down to the IDP Setup section, click Edit and provide the following information:
    • Redirect URI - generated automatically when the IDP setup is completed. Copy the Redirect URI value after finishing the setup and paste it to your respective identity provider.
    • Client ID - copy the Application (Client ID) value from your IDP and paste it here. It is used to register my.anydesk as an OIDC client with your provider. 
    • Client Secret - copy the Client Secret value from your IDP and paste it here. It is used to register my.anydesk as an OIDC client with your provider. 
    • Token URL - copy the Token endpoint value from your IDP and paste it here. It returns the access tokens, ID tokens, and refreshes tokens to the client (my.anydesk).
    • Authorization URL - copy the Authorisation endpoint value from your IDP and paste it here. It is used for authentication and authorization of my.anydesk client.
    • Trust Email - turn the toggle off to let users verify their email address via my.anydesk II. Turn the toggle on to disable my.anydesk II email verification.
    • Backchannel Logout - turn on the toggle to enable the support of backchannel logout by configured IDP. If enabled, the Logout URL field must be provided.
    • Logout URL - provide the endpoint to log out users from external IDP. Backchannel Logout must be enabled.
    • Allowed Clock Skew - provide value in seconds (the default value is 0). It determines the acceptable skew when validating IDP tokens.
    • Default Scopes - the scopes included when requesting authorization. The default is openid. Provide a comma-separated list of additional scopes you want to request.
    • Validate Signatures - turn on the toggle to enable signature validation of configured IDP. If enabled, the JWKS URL field must be provided.
    • JWKS URL - URL where my.anydesk II can retrieve the keys for the configured IDP. Validate Signatures must be enabled.
      idp setup
  5. Click Finish edit.  
  6. After saving the identity provider, copy the assigned Redirect URI.
  7. Open your identity provider and go to Authentication.

    ❗  For example purposes, Microsoft AzureAD identity provider is used here to showcase the procedure. You can use any other third-party identity provider that you wish.

  8. Click Add a platform, select Web and paste the Redirect URI you copied after saving the identity provider in my.anydesk II.
    redirect uri
  9. Click Configure.

After completing the above steps, all users from your your identity provider will be able to sign in to my.anydesk II with SSO using the organization's ID.

top_button-1


Set up IDP mapper

You can map roles from your organization to users in my.anydesk II. This way, you do not need to assign roles to users manually.

First, you need to configure a group token in your identity provider. Then, in order to set up the IDP mapper, at least one role needs to already exist in the my.anydesk II management console. This role can then be mapped to a role within the identity provider.

After mapping the role(s), its status will change to mapped. This means that users can no longer be manually linked to that role. Deleting the IDP mapper will remove the mapped status and allow you to manually link users to that role.

To set up the IDP mapper:

  1. Open my.anydesk II and go to Organization
  2. Scroll down to the IDP mapper section, click Create new IDP mapper and provide the following information:
    • Name - enter the name for the IDP mapper.
    • Claim - provide the following information:  
      • Key - enter the key of the IDP attribute you wish to map.
      • Value - enter the value of the IDP attribute you wish to map. 
    • Role - select the role from the drop-down list that you wish to assign to the specified IDP user within the my.anydesk.com management console.  
      create new idp mapper
  3. Click Create new IDP mapper. 

Afterward, if a user that matches the key-value criteria logs into their my.anydesk II account, they will automatically have all the permissions assigned to the role they were mapped to.

Example

For example, if you want every user from your identity provider with the first name John to be given the administrator AnyDesk role, then for the Key field, enter FirstName (depending on the key in your IDP), for the Value field, enter John, and in the Role field, select admin

top_button-1