Configure Azure AD

The Azure adapter allows SSO (single sign-on) in Azure over the OpenID Connect (OIDC) protocol. Use this guide to configure the Azure AD server and set up adapter-azure_aaa for Itential Platform.

The information provided was developed in a lab environment. Input for various settings and fields should be populated with details specific to your production environment.

This page outlines the process and permissions required for the Azure AAA adapter to communicate with the Azure AD system.

Admin privileges in the Azure AD system are required to perform the initial setup.

Create a new application

1

Open App Registration

Log in to the Azure AD system and access the Azure AD page. Select the App Registration section and click New registration.

Create a separate application for each environment so that passwords and configurations are unique to each environment.

Application registration
2

Complete the application fields

Fill in the registration form. For example:

  • Name: Itential Automation Platform - Production
  • Supported Account Types: Default
  • Redirect URI: Leave blank; you will update it later.

Click Register.

3

Record the Application ID and Tenant ID

Review the application details. Record the Application ID — it will be used by the adapter as the client id. Record the Tenant ID — it will be used by the adapter as the tenant id.

Application ID

Configure authentication settings

1

Set redirect URIs

Go to the Authentication section. Verify the Redirect URIs. These are the acceptable return URIs after authentication. If a redirect is attempted to a URI that does not exist here, the redirect will fail. Pay close attention to ports — you must have a URI for each port.

Typically the URL is the same as the sign-on URL, or a sign-on URL with a specific SSO page. For example:

  • https://itential.customer.com/login
  • https://localhost:3443/login
Authentication settings
2

Enable ID tokens

Enable the ID tokens under Advanced settings.

Advanced settings — enable ID tokens

Set application permissions

1

Add API permissions

Go to the API Permissions section. Click + Add a permission. Find and select Microsoft Graph API from the list.

2

Select required permissions

From the list of Application Permissions, check the following:

  • Directory.Read.All
  • Group.Read.All
  • User.Read.All

No delegated permissions are required. Click Add Permission.

Required permissions

Set the API key

1

Create a new password

Go to Settings > Keys and create a new password by completing the following fields:

  • Description: IAP API Key
  • Expires: Never
  • Value: <super_secret_password>
Secret password

Expiration policies vary across organizations. Follow the guidelines for your organization.

2

Save the value

Click Add. A warning message displays reminding you to keep a safe copy of the Value, which has been encrypted. This value is used in the secret field by the Azure AAA adapter.

API key

Add optional claims (Access Token v2.0)

If you have configured your registered application Manifest to use accessAcceptedTokenVersion: 2, you must create an optional claim for upn on your ID tokens and access tokens. The upn claim is used by the Azure adapter internally to handle account routing in Itential Platform and is required.

Manifest
Optional claims — UPN