OpenID Connect with Azure AD
Configure OpenID Connect with Azure Active Directory/Microsoft Entra ID
Once you have completed this configuration you may enable an OpenID Connect “Login with Azure AD” button for TrueFoundry dashboard. See Microsoft Entra ID - Register An App Quickstart Guide as an additional reference.
Register a New Azure Active Directory Application
You will first need to login to the Azure Portal.
Once logged in, navigate to Azure Active Directory -> App Registrations -> New Registration to create a new Azure Active Directory Application.
Here we have configured our application Redirect URI
. Use redirect URL value ashttps://login.truefoundry.com/oauth2/callback
.
Once the application has been created, note the Application (client) ID
and the Directory (tenant) ID
. These will be used respectively as the Client Id value and to construct the Issuer value in your TrueFoundry OpenID Connect Identity Provider configuration.
Device Code Flow
To enable the Device Code login flow, follow the steps below:
- Navigate to
Authentication
tab underManage
section in your app registration page - Scroll down to
Advanced settings
and enableAllow public client flows
Create a New Azure Active Directory Application Secret
Navigate to Azure Active Directory -> App Registrations -> [Your Application] -> Certificates & secrets -> New client secret to create a new Azure Active Directory Application Client Secret.
Note the VALUE
of the created client secret. This will be used as the Client secret value in your TrueFoundry OpenID Connect Identity Provider configuration.
Integrate with TrueFoundry
To integrate Azure AD with TrueFoundry, provide the following configuration to the truefoundry team via email:
- Tenant ID: Tenant or Directory ID of your Azure application.
- Client ID: Application ID of your Azure application
- Client Secret: Secret value of client secret created in the above step
Updated 22 days ago