Set up OIDC-based single sign-on on a memoQ server - Part 1 - for the company system administrator

What you need

Before you start configuring, gather the information below. You will need these at different points during the process.

  • settings.json for your identity provider (or IDP) (find them here)
  • The Subject value from the certificate the Authentication Manager will use. It should be a commercial (not self-signed) certificate. It can be the one your memoQ server uses. On the server machine, open the Manage Computer Certificates application (or run the certlm.msc command). Find the certificate in the Certificates - Local Computer/Personal/Certificate folder. Double-click the certificate, click the Details tab and write down the value in the Subject field.
  • The connection string for your memoQ server database: Open the folder %PROGRAMDATA%\MemoQ Server, and open Configuration.xml in a text editor. Copy the value between the <SQLConnectionString> tags.
  • The port that memoQ's Authentication Manager will use. You need to open this port on the firewall. By default, it is 5001.
  • name for the IDP - this will be the IDP's name in the memoQ server database, and a part of the Account origin info in memoQ's User management window.
  • A display name - the text on the "Sign in with IDP" button on the login page.

Setup and configuration

The Authentication Manager is a separate service next to the memoQ Server service. It is installed together with memoQ server, but needs to be registered and configured to become functional.

Using multiple ID providers with a memoQ server

A memoQ server can accept user authentication from more than one ID provider system. For example, two departments of a company might use different Azure AD tenants, or in-house employees might be stored in one ID provider system, while external vendors in another.

In addition, you can have the “traditional” users who can log in with memoQ server credentials.

No multiple IDP systems per user: One memoQ user can only be connected to a single IDP system - or none, if they use the “traditional” memoQ login.

Compatibility

OpenID Connect-based SSO works only in versions 9.5 and up. Earlier versions of memoQ server cannot recognize and manage users of OIDC origin.

No rollback to earlier versions: When installing OIDC-based SSO on your memoQ server, the Configuration Tool adds new tables to the memoQ server database. This means you cannot use rollback to get back to your previous version.

Further information

See general user authentication schemas and a few tips for test environments here.