Azure Single Sign On
Guzzle provides support for configuring Azure Active Directory (AAD) single sign-on (SSO) to allow AAD users to login into Guzzle. Below are the steps to configure Azure Active Directory single sign-on:
#
Configuration on Azure Active DirectoryTo use create a new one that shall be used by Guzzle to perform SSO- for more
- Create new app registration
- Generate a secret with appropriate expiry date
- Add following API permissions
- Microsoft Graph
- Azure DevOps (This is required if you plan to enable Azure Devops git integration.)
- Azure Service Management (for getting user profile details)
- In Authentication tab add following:
- add redirect URL (which is provided by Guzzle) For redirect URL guzzle follows below rules, http://<domain of guzzle app>/oauth/microsoft.
- Only Single tenant is supported
note
You can also use existing App registration in AAD and add the redirect URL of the Guzzle instance you are integrating. However, as a best practice, each Guzzle instance should have its own App registration for better segregation
Guzzle internally uses below scopes for Azure Active Directory single sign-on:
Scopes | Purpose |
---|---|
499b84ac-1321-427f-aa17-267ca6975798/user_impersonation (Azure DevOps) | Guzzle create Access token for azure DevOps when users are logged in to achieve this user have to give azure devops scope to Azure Active Directory SSO. |
OpenID | To retrieve email |
profile | To retrieve username |
offline_access | To retrieve refresh token |
https://management.azure.com/user_impersonation | To retrieve user profile |
#
Enabling Azure SSO in GuzzleStep 1. Go to Manage from the top navigation bar.
Step 2. Go to Security from the sidebar
Step 3. Click on Azure Single Sign On
Step 4. Click on Enable to enable SSO
Step 5 : Enter all below necessary details
Client Id < ID of client >
Client Secret < You can give client secret as manual or by providing key vault name and secret name >
Tenant Id < Tenant ID >
Redirect URI < URL to which you have to redirect when Guzzle will open. >
Step 6 : Click on Save < To save this properties click on save. >
Step 7 : Create User
Once user enabled Single Sign-on User have to create their profile in guzzle as well.
Click on Users which is Under Manage Settings Security tab
Click on create user
Enter all valid necessary details
Click on Create
note
Once SSO is enabled, the native login gets disabled. User can only log in via SSO