Azure
Enabling SSO with Azure OIDC is based on the Microsoft documentation here.
Follow these 3 Steps
1. Create an App Registration
- Navigate to the App registrations section in the Azure Portal.
- Select "+ New registration" toward the top of the page.
- Enter a name for your application
- Choose Single tenant as the supported account type (Accounts in this organizational directory only). Click Register.
- Leave Redirect URI (optional) as it is for now and click Register
- After registration:
- Copy/Save the Application (client) ID and Directory (tenant) ID from the app's Overview page.
- In the left menu, expand the Manage section and select Certificates & secrets and create a new Client Secret:
- Click New client secret, enter a description, and set an expiration period.
- Copy/Save the generated Client Secret Value (you won’t be able to view it later).
The following information are need to be documented/saved for later.
- APP ID (Application (client) ID) from step 6
- TENANT ID (Directory (tenant) ID) from step 6
- APP SECRET (Client Secret Value) from step 7
note: if you use an existing app with "API Permissions" you must ensure that any required Admin Grant's are approved. If you have not configured any API Permissions, this is not required
2. Configure Authentication Settings
- Navigate to your App in the App registrations section of the Azure Portal.
- In the left menu, expand the Manage section and select Authentication
- Under Platform configurations select "+ Add a platform"
- Select "Web" in the "Configure Platforms" slide-out
- Enter the appropriate Redirect URI of the application:
- Enter the appropriate Front-channel logout URL:
- Ensure "ID Tokens" is selected
- Click Configure
- Optional: Back in Authentication
- Enable: Allow public client flows
- Click Save
3. Enable OIDC in Prelude
- In the Prelude UI, click your name/id in the top right corner, then select Account Settings then OpenID Connect Settings
- or select the appropriate link
- US1: https://platform.us1.preludesecurity.com/account/oidc
- EU1: https://platform.eu1.preludesecurity.com/account/oidc
- Enter the OIDC Information
- Organizational Slug: You can change this to be something indicative of your organization
- Provider: Azure
- Client ID: APP ID recorded in step 1 (Create an App Registration)
- Client Secret: Client Secret recorded in step 1 (Create an App Registration)
- Configuration URL:
- https://login.microsoftonline.com/{TENANT_ID}/v2.0/.well-known/openid-configuration
- replace {TENANT_ID} with TENANT ID recorded in step 1 (Create an App Registration).
- Click Save
Updated 11 days ago