Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

Intro

This manual page is mainly for area owners, key customer contacts, but also for end-users so that they can be aware of such solution and can ask management or proper ICT contacts to implement it also in their environment.

...

  • Go to https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps
  • Click "New registration"
  • Set name "Tietoevry DevOps Space (TDS) Keycloak" or something similar
  • Select who can use it, usually first option "Accounts in this organizational directory only (Tietoevry only - Single tenant)" is OK
  • Set Redirect URI to callback URL:

    Code Block
    https://identity.core.tds.CUSTOMERX.com/auth/realms/tds/broker/main-oidc/endpoint


    Note

    It says that it is optional, but it is mandatory in our case.


  • Click "Register"
  • On shown overview screen you shall find and copy following values that will be needed later for setup on Keycloak side:
    • Application (client) ID
    • Directory (tenant) ID
  • Following claims need to enabled:
    • sAMAccountName (onpremisessamaccountname)
    • email
    • firstname
    • lastname
  • AzureAD team must run following powershell commands to properly enable "sAMAccountName" claim

...

TDS team needs following details in order to finish integration:

AttributeExample/template value
Authorization URLhttps://login.microsoftonline.com/<TENANT-ID>/oauth2/v2.0/authorize
Token URLhttps://login.microsoftonline.com/<TENANT-ID>/oauth2/v2.0/token
Client IDb1a10f18-5456-47c3-9843-d90cd58c5278
Client Secret

m4yg87DR-_juvp~Tv4U9w-q9x8Mzmo~1Lp

Please make secret valid for as long applicable period as possible - infinity or maximum number of months that organisation allows.

We also need to setup process for replacing secret on regular basis according to validity possibilities.

...