Example: Configuring Azure AD using OIDC for External Authentication
The following example is configuring OpenID Connect on Azure to use with CloudControl for External Authentication.
-
In Microsoft Azure, register
as an application.Enter the name, select 'Accounts in this organizational directory only', and enter the following for the Redirect URI:
https://<CloudControl_login_url>/asc/api/rest/v1/login
-
Click Register.
The application page displays.
-
Click Certificates & secrets in the sidebar to create a client secret.
-
In the Client secrets section, click New client secret.
-
In the Add a client secret window, enter a description, set the expiration date, and click Add.
-
Copy the client secret value to a text window for later use.
-
Click Token configuration in the sidebar and then click Add optional claim.
-
In the Add optional claim window, select 'ID' for the token type and 'upn' and 'sid' for the claim.
- Click Add.
-
In the pop-up window, check the 'Turn on the Microsoft Graph profile permission (required for claims to appear in token) checkbox.
-
Click Overview in the sidebar, and then click Endpoints.
-
In the Endpoints window, copy the OpenID Connect metadata document (up to and including the v2.0) to a text window.
For example, https://login.microsoftonline.com/a995284f-7628-4646-b755-ja0e3c7f0264/v2.0
Note: This will be the CloudControl base URL.
-
Close the Endpoints window to return to the Overview page.
-
Copy the Application (client) ID to a text window.