Once you have completed this configuration you may enable an OpenID Connect “Login with Azure AD” button for TrueFoundry dashboard. See Microsoft Entra ID - Register An App Quickstart Guide as an additional reference.
You will first need to login to the Azure Portal.
Once logged in, navigate to Azure Active Directory -> App Registrations -> New Registration to create a new Azure Active Directory Application.
Here we have configured our application Redirect URI
. Use redirect URL value ashttps://login.truefoundry.com/oauth2/callback
.
Once the application has been created, note the Application (client) ID
and the Directory (tenant) ID
. These will be used respectively as the Client Id value and to construct the Issuer value in your TrueFoundry OpenID Connect Identity Provider configuration.
To enable the Device Code login flow, follow the steps below:
Authentication
tab under Manage
section in your app registration pageAdvanced settings
and enable Allow public client flows
Navigate to Azure Active Directory -> App Registrations ->[Your Application] -> Certificates & secrets -> New client secret to create a new Azure Active Directory Application Client Secret.
Note the VALUE
of the created client secret. This will be used as the Client secret value in your TrueFoundry OpenID Connect Identity Provider configuration.
To integrate Azure AD with TrueFoundry, provide the following configuration to the truefoundry team via email:
Once you have completed this configuration you may enable an OpenID Connect “Login with Azure AD” button for TrueFoundry dashboard. See Microsoft Entra ID - Register An App Quickstart Guide as an additional reference.
You will first need to login to the Azure Portal.
Once logged in, navigate to Azure Active Directory -> App Registrations -> New Registration to create a new Azure Active Directory Application.
Here we have configured our application Redirect URI
. Use redirect URL value ashttps://login.truefoundry.com/oauth2/callback
.
Once the application has been created, note the Application (client) ID
and the Directory (tenant) ID
. These will be used respectively as the Client Id value and to construct the Issuer value in your TrueFoundry OpenID Connect Identity Provider configuration.
To enable the Device Code login flow, follow the steps below:
Authentication
tab under Manage
section in your app registration pageAdvanced settings
and enable Allow public client flows
Navigate to Azure Active Directory -> App Registrations ->[Your Application] -> Certificates & secrets -> New client secret to create a new Azure Active Directory Application Client Secret.
Note the VALUE
of the created client secret. This will be used as the Client secret value in your TrueFoundry OpenID Connect Identity Provider configuration.
To integrate Azure AD with TrueFoundry, provide the following configuration to the truefoundry team via email: