Skip to main content

Azure Entra ID (Azure AD)

This document explains the steps needed to setup SSO with Azure AD

Updated over 4 months ago

Logging in via Azure AD

Once an integration with Azure AD has been set up, the following option will appear on the login screen:

Setup steps

  1. Login to the azure portal

  2. Navigate to Azure Active Directory

  3. Create a new app registration

  4. Insert a name and press register

  5. Select your newly created app registration, click through to authentication and press add a platform

    Next, select Web and enter the following redirect URI: https://identity.dscribe.cloud/sso/callback

    After that you should navigate to the API Permissions and grant the following rights:

    • GroupMember.Read.All and User.Read.All

    The priviliges should be of type Application (with admin consent).

  6. Navigate back to your application via Azure Active Directory > App Registrations > Select your newly created App and copy the Application (client) ID and Directory (tenant) ID somewhere safe. You will need it later.

  7. In your application, navigate to 'Certificates & secrets' and create a new client secret and copy value:

  8. Last step is to get the open metadata endpoint. Navigate to App Registration > Endpoints

    Copy the URL and open it in a new tab in your browser. It will open a screen with important urls (token_endpoint, issuer, userinfo_endpoint and authorization_endpoint). You will need these to setup a SSO integration in dScribe.

  9. Open the dScribe app settings via below icon (App picker) in the top right and click on 'Explore all apps'. This will take you to the identity setup page.

    From here, navigate to the 'Organisations Settings' tab where SSO Providers can be configured (see also dScribe Authentication for more information).

    Below additional settings can be configured

    Dynamic user creation: if the user is known in AD, a dScribe user will be created with a default team assigned.

    Allow Login via Magic Link: allows password less login via e-mail link

    Sync security groups from SSO provider (Azure/Entra ID only): allows to automatically map your AD security group with your dScribe teams. Upon active selection, the mapping can be configure in the app of choice. E.g below the example of the catalog mapping 

    In order for a user to be able to perform the SSO setup, the user needs to be tenant owner of the application. This is feasible in below screen after the user has been created in dScribe Catalog.

Please note:

  1. Depending on your Azure Active Directory setup it can be necessary to have admin consent. This will be a one time pop-up in the login flow to authorise the dScribe application. Once the admin approved, every user should be able to login.

  2. Only tenant owners will see the "Organizations Settings" tab and thus will be the only ones authorised to do the SSO setup.

Did this answer your question?