- Print
- PDF
This guide provides a comprehensive walkthrough for integrating Azure Active Directory with Knovvu VA, streamlining authentication for Azure AD users accessing the web interface via single sign-on (SSO).
- In order to integrate with Azure AD, the host user must enable
Azure AD SSO
from host settings under Administration --> Account --> External Provider. However, "Authority", "Client ID" and "Client Secret" parameters must remain blank.
- Before setting up Azure AD,
Redirect URI
information must be obtained from SESTEK. This Redirect URI is where users are directed after successfully authorizing the application.
Redirect URI: {{identityBaseUrl}}/signin-azuread-oidc?tenantId=<tenantId>
Setting Up Azure AD
To facilitate authentication and authorization between Knovvu VA and Azure AD, a new app should be registered in Azure, and permissions should be assigned accordingly.
Step 1: New App Registration
After logging into the Azure Portal, navigate to Azure AD and select "App registration" to proceed with creating a "New registration".
Specify the application name and supported account types. Then, under Redirect URI, choose "Web" and paste the redirect URI provided by SESTEK, as seen in the screenshot shown below.
Step 2: Authentication
Once the application successfully registered, go to "Authentication" in the left menu and enable ID tokens.
Step 3: Certificates & Secrets
In the left menu, navigate to "Certificates & secrets" and generate a new client secret to be used in the authentication process.
After expiration, a new client secret must be obtained and its value must be entered in the settings via the Knovvu VA user interface, otherwise Azure AD users will no longer be able to utilize Single Sign-On (SSO).
After successfully creating the client secret, ensure to copy the Client Secret Value
.
Step 4: Application (client) ID
Navigate to "Overview" section and copy the Application (client) ID
.
Step 5: Endpoint
Click on "Endpoints" and copy OpenID Connect metadata document endpoint
, excluding ".well-known/openid-configuration" part.
Configuring Tenant Settings
After Azure AD setup is finished, the tenant admin must enter the Client Secret Value
, Application (client) ID
and OpenID Connect metadata document endpoint
information within the Knovvu VA user interface. This can be done through Administration --> Account --> External Provider, as shown in the screenshot shown below.
Azure AD SSO functionality is now enabled on the login screen.
When users log in to the interface for the first-time using Azure AD SSO, a user profile is automatically created for them, and they are assigned the designer
role by default. This grants users designer-level access within the application interface.
Administrators can further customize role assignments or permissions within the application itself.