Using Azure Active Directory as Identity Provider¶
Configuring Azure Active Directory¶
Hint - example configuration
The following configuration is an example of SealCC and DPF Tracker.
-
Logon to the Azure portal and open
Azure Active Directory
. -
In
App registrations
, selectNew registration
to create a new app. -
Select a display name for the app and register it.
-
In
Authentication
, selectAdd a platform
and add aWeb
platform. -
Add the redirect URIs with complete path and query parameters, e. g.
-
for SEALCC:
https://127.0.0.1:9126/cgi-bin/sealcc/sealcc?function=oauthLogin&package=sealcc%3A%3Aplugins%3A%3Alogin&lastfunction=oauthlogin
-
for DPF Tracker:
https://127.0.0.1:9126/cgi-bin/dpftracker?login=1
-
-
In
Certificates & secrets
, create a new client secret. -
In
Token configuration
, add thegroups claim
to the ID token. -
In
API Permission
, add theopenid
permission. -
In
expose an API
, add a scope. -
In
Manifest
, check the value ofaccessTokenAcceptedVersion
. It has to be2
. -
In
Overview
, find a list of all necessary endpoint URIs. -
Configure your SEAL Systems applications with the corresponding endpoints and created scope.
-
in the given example:
api://ff5e9507-350d-41df-afd2-7d2a561a9060/sealcc
-
Hint - repeat for each client
You have to repeat this for each required client:
- easyPRIMA
- PLOSSYS Administrator
- PLOSSYS CLI
- PLOSSYS Infoclient
- SEAL DocPrint
- SEAL Print Client/SEAL Operator
- SEAL OP-CLI