:loudspeaker: New Feature: Improved Federated Iden...
# product-updates
n
📢 New Feature: Improved Federated Identity Management & JIT Provisioning We’re excited to announce a major update for Federated Identity Management (FIM) and *Just-in-Time (JIT) User Provisioning*—making authentication and user access management more seamless than ever. What’s New? • Microsoft Entra ID Support – FIM now integrates with Microsoft Entra ID, enabling seamless authentication for more users. • Embedded Analytics Support – FIM now works smoothly in embedded environments, including iframes. • More Flexible JIT Provisioning – Expanded configuration options for greater adaptability across identity providers. Why It Matters?Stronger Security – Federated authentication ensures secure and compliant access management. • Improved User Management – Automate user provisioning to save time and reduce manual effort. • Seamless Integration – Works across embedded analytics and multiple identity providers for a smoother authentication experience. 📖 Documentation:Federated Identity Management Now Supported in EmbeddingAzure Identity Management in Federated Identity ManagementCustomizable JIT Provisioning Now Fully Supported 🎥 Demo: Watch Now Got questions or feedback? Let us know! 💬
🙌 2
👍 2
p
@Jan Franek @Evangelos Malandrakis We are currently using Auth0 as the only Idp with Goodata for all users. We have client that want to use Azure Identity Management/Entra ID for their user population*.* The user population using Entra ID would have their own domain in their email addresses, for example clientA.com. All the other users currently using Auth0 have different domains for their emails, for example gmail.com, hotmail.com, clientABC.com, clientY.se etc. For MOIDC would it be possible to configure: Configre Entra ID for all users with email domain clientA.com. Configure Auth0 for all other email domains. So, if the email domain does not have a match it should be directed to the default Idp (Auth0).
j
Hello @Philip Asp, this is not supported currently. you need to explicitely define this list of domains for each of identity providers. One IdP definition supports up to 50 identifier definitions. You can find more details here
p
Ok, thanks