How to log in to DevTest 10.7.2 - Enterprise Dashboard, Portal and IAM using Azure login seamlessly ?
DevTest 10.7.2
The screenshots below show how the Login happens seamlessly with Azure SSO Integration setup with IAM.
Click on 'AZURE SSO LOGIN'
and
Choose the Microsoft Azure Account that you want to login with
You will be logged in to IAM using the Azure User ID. See the top right corner below
Click on 'AZURE SSO LOGIN'
and
Choose the Microsoft Azure Account that you want to login with
You will be logged in to IAM using the Azure User ID. See the top right corner below
Click on 'AZURE SSO LOGIN'
and
Choose the Microsoft Azure Account that you want to login with
You will be logged in to IAM using the Azure User ID. See the top right corner below
Add an Identity provider as shown below:
Login to https://portal.azure.com/#view/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/~/Overview
as the appropriate Azure account ([email protected]). This is a special user which is a NON-FEDERATED local user created by n <[email protected]>
created on <Month dd yyyy>
Once logged in, you need to click on 'App registrations' from the left side
In the ensuing screen, click on 'New registration'
https://hostname.dhcp.domain.net:51111/auth/realms/service_virtualization/broker/azuresso/endpoint
Fill the values like what is shown below to create a new APP Registration in Azure
Note: The Redirect URI comes from IAM as you create a new Identity Provider with OpenID Connect V1.0
Now the Azure new App Registration screen. Fill in the details as shown below and click 'Register'
Upon creation, the screen changes to this:
Back to IAM UI new Identity Provider with OpenID Connect V1.0 screen, you would need the Authorization URL, Token URL, Client ID and Client secret.
These values come from the Azure APP registration. In the screenshot above,
click on Endpoints (Globe Icon)
Now jump to the screenshot below to see the Endpoints popup screen, You need to copy the Authorization URL, Token UR from it
YOU NEED TO USE THE V1 URLs.
Client ID (Application (client) ID) comes from the details screen. See below
The last thing that we need to complete the work on IAM side is to generate a client secret. On the right side of the App details screen on Azure, click on the first link "Add a certificate or secret"
In the ensuing screen, click on 'New client secret'
Give description and expiry days
Click Add. You would be back to the Client secrets section, but you would see a new Client Secret created.
IMPORTANT: YOU GET ONLY ONE CHANCE TO COPY THE CLIENT SECRET. SO COPY IT AND PRESERVE IT
Our APP Registration is complete on Azure side. Now use this information and fill in the Identity provider on IAM
The last thing on IAM side is the mappers. This is needed to assign a role for the SSO user who logs in to ED, Portal and IAM using Azure login.
Go to mappers and click on create.
Create 3 mappers as shown below and give the client role as shown.
This is how you would choose the roles:
USEFUL REFERENCE: https://blog.hcltechsw.com/versionvault/how-to-configure-microsoft-azure-active-directory-as-keycloak-identity-provider-to-enablesingle-sign-on-for-hcl-compass
For Google, see DevTest - DevTest - Google SSO Configuration Guide
For OKTA, see DevTest - OKTA SSO Configuration Guide