Configure Locker SSO to OpenID Connect-enabled Apps

Applies to iOS devices only.

Imprivata Mobile Access Management adds authentication to OpenID Connect (OIDC) apps that are configured for OIDC with Imprivata as the Identity Provider (IdP). Authentication is sharing the MAM user session with a third party app so that a user does not need to enter credentials for authentication to the third party app.

The app session is secured with the user's personal device passcode.

NOTE:

Locker SSO is not mutually exclusive with Password Autofill. You can still use Password Autofill on other applications, however, you may want to hide the Password Autofill prompt by configuring a Locker Custom Option.

Prerequisites

NOTE:

Supported in MAM 7.3 and later.

Take note of the following prerequisites:

  • Imprivata Locker app for iOS - 4.3 or later

  • Password Autofill and SSO setting is enabled in MAM console (Admin > Check Out > Password Autofill and SSO).

  • Integration with Imprivata Enterprise Access Management.

    The following EAM dependencies for OIDC integration must be completed:

    • Imprivata appliances are running a maintained release of EAM. For more information, see the EAM Supported Components.

    • Imprivata licensed for Single Sign On.

    • OpenID Connect applications are added to your Imprivata enterprise.

    • OpenID Connect applications are deployed to selected set of users.

    • Imprivata users are assigned to a user policy enabled for Single Sign On.

    • SSO Extension profile is deployed from your MDM.

Network Requirements

Ensure that your firewall policy is configured to allow communication for Locker SSO.

Add the following hosts to your firewall allowlist:

*.cloud.imprivata.com

Face Authentication for OIDC-enabled Apps

Beginning in 7.3, as a new standard workflow, you can eliminate the device passcode and allow users to use face authentication for OIDC-enabled apps, like Epic Rover.

  • At device checkout, users are not prompted for a device level passcode. Instead, MAM secures the apps with Face authentication and short inactivity timeouts.

  • Supports any apps that use OIDC.

  • Gives high assurance that the user of the app matches the user who checked out the device.

Requirements

Face authentication for OIDC-enable apps requires the following:

  • Requires an Imprivata Advanced Passwordless Access (APA) license.

Considerations

Application-level timeouts that require the user to re-authenticate are controlled by the individual apps themselves.

There is no way to configure this in either EAM or MAM, and is not affected by EAM user policy grace periods for multi-factor authentication (MFA).