Skip to main content
Version: 3.2.0

Microsoft Entra ID Authorization Provider (OIDC)

The following steps will guide you through configuring a OIDC Authorization Provider using Microsoft Entra ID as the identity provider for authentication.

Create an App Registration

  1. Login to https://portal.azure.com

  2. Navigate to Microsoft Entra ID

    Azure Portal Homepage
  3. In the left-hand navigation pane, expand Manage and select App registrations

    App Registrations Navigation
  4. Click New Registration

    App Registrations - Create New Registration Button
  5. In the Register an application form, enter a name for your application. Under Supported account types, select Accounts in this organizational directory only, then click Register

    App Registrations - Create New Registration Form

    You will then be taken to the overview page of your newly created application

    App Registrations - Overview Page
  6. In the left-hand navigation pane, expand Manage and select Certificates & secrets

    App Registrations - Certificates & secrets navigation
  7. Click New client secret to generate a new secret for your application

    App Registrations - New Client Secret Button

    Provide a description for your client secret (optional), and set an expiration period

    App Registrations - Add Client Secret Form

    important

    Make sure to copy the Value of the newly created client secret, as it will not be visible again after leaving this page


  8. Navigate to Manage -> Token Configuration

    App Registrations - Add Client Secret Form
  9. Click Add optional claim and add the following claims:

    Token TypeClaim Name
    Accessgiven_name
    Accessfamily_name

  1. Return to the Overview page and make a note of the Application (client) ID

  2. While still on the Overview page, click Endpoints and make note of both the OAuth 2.0 authorization endpoint (v2) and the OAuth 2.0 token endpoint (v2)

    App Registrations - Endpoints
  3. Navigate to Manage -> Authentication

  4. Click Add a platform, then select Web

  5. Set the Redirect URI to:

    • https://<asi3_hostname>:50443/auth/realms/ASI/broker/<app_name>/endpoint

    tip

    The <app_name> refers to the name you provided when creating the application. You’ll use this name later when configuring the Authorization Provider in ASI 3.

ASI - Authorization Provider Configuration

  1. Login to your ASI 3 system

  2. From the left-hand navigation panel, go to SettingsAccess ManagementAuthorization Providers

    ASI 3 - Authorization Providers Page
  3. Click Create at the top-right and select OIDC. You will be presented with the OIDC configuration form

    ASI 3 - OIDC Configuration Form

  1. Configure the fields in the form as follows:
FieldValue
AliasThe name assigned to the application in Microsoft Entra ID
Display NameA user-friendly name for identifying the Authorization Provider in ASI 3
TypeOIDC
Token URLThe OAuth 2.0 Token Endpoint copied from the Entra ID App Registration
User Info Urlhttps://graph.microsoft.com/oidc/userinfo
Client Auth MethodClient secret sent as post
Sync ModeImport
Client IDThe Application (client) ID from your Entra ID App Registration
Client SecretThe client secret generated during app registration
Authorization UrlThe OAuth 2.0 Authorization Endpoint copied from the Entra ID portal

  1. Once all fields are configured, proceed by clicking Next to begin setting up the mappers

  2. On the Mappers page, click Add Mappers

  3. Create a username mapper with the following configuration:

NameSync ModeMapper TypeUsername FormatTarget
usernameFirst importUsername Template Importer${ALIAS}.${CLAIM.given*name}*${ALIAS}.${CLAIM.family_name}Local

  1. When you’ve finished configuring the mappers, click Finish

note

After setup is complete, users will see a new option on the ASI 3 login screen that allows them to sign in using their Microsoft Entra ID credentials


ASI 3 - Login Page with OIDC option

If you experience any issues after configuring the provider, please contact Support