Azure
Warning
This guide should be used as a functional example only. Identity Admins should follow their Company's policies and best practices when implementing Single Sign-On (SSO).
Similarly, because these guides are for services Horizon3 does not control, screenshots and configuration options may be different then what you see here.
All sections of this page should be completed by someone with permissions for Identity Team Admin
Create Azure Enterprise Application
- Log into Azure Portal and browse to the "Azure Active Directory" service.
- In the left hand menu under the "Manage" section, click "Enterprise applications".
- Then click "New Application".
-
Then click "Create your own application".
Required Role
You will need to have one of the following Azure AD roles in order to create a new application
Global Administrator Application Administrator
-
Name your app "NodeZero Portal".
-
Select the "Register an application to integrate with Azure AD (App you're developing)" option.
-
Click Create.
-
On the "Register an application" page, you can choose to set a different user-facing name for the app, if desired.
-
Ensure the "Supported account types" option is set to "Single tenant".
-
Leave the "Redirect URI" section blank for now.
-
Click Register.
Copy Client ID
After registering the app, you'll be taken back to the "Browse Azure AD Gallery" page. Navigate back to the Enterprise applications page, find your newly created app, and click it.
- Click on the Overview page.
- save the Application ID. This is the Client ID that you will need to provide to your Portal Org Admin later.
Configure Single Sign-On
Under the Manage section of the left hand menu,
- Click Single sign-on.
- Click
Go to application
.
Copy Issuer URL
On the new Overview page (step 1), click the Endpoints tab (step 2) and copy the OpenID Connect metadata document
value (step 3). This is this Issuer URL that you will need to
provide to your Portal Org Admin later.
Configure Authentication
Under the Manage section,
- Click Authentication.
- Click
Add a platform
under the "Platform configurations" section. - In the form that opens to the right, click the
Web
button under the "Web applications" section.
Use the information in the below table to fill out the "Redirect URIs" field. Be sure to select the correct tab based on which regional Portal your users access.
Field | Value |
---|---|
Sign-in redirect URIs | https://portal.horizon3ai.com https://auth.horizon3ai.com/oauth2/idpresponse |
Field | Value |
---|---|
Sign-in redirect URIs | https://portal.horizon3ai.eu https://auth.horizon3ai.eu/oauth2/idpresponse |
Adding multiple Sign-in redirect URIs
The initial form appears to only allow you to enter a single URI. Enter the first URI from the appropriate
table below, click Configure, then click the Add URI
link in the Web > Redirect URIs section on the main
page. Enter the 2nd URI and click Save
.
Create Client Secret
Under the Manage section,
- Click Certificates & Secrets.
- Click
New client secret
. - Enter a description.
- Set the
Expires
column to a value that aligns with your Company's policies. - Click
Add
.
- Copy the Secret Value.
This is the Secret VALUE, that you will need to provide to your Portal Org Admin later.
Configure API Permissions
Under the Manage section,
- Click Api permissions.
- Ensure the Microsoft Graph
User.Read
permission is configured (it should be by default).