Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This is quite straightforward and modern solution for adding support for centralised authentication. These are instructions for AzureAD adminstrators We usually meet together with customer organisation representatives and their identity provider administrators and settle down procedure details and requirements. Then AzureAD adminstrators need to follow steps how to integrate TDS Keycloak using OIDC as defined in this chapter.

Registering application in Azure portal

...

  • Go to https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps
  • Click "New registration"
  • Set name "Tietoevry DevOps Space (TDS) Keycloak" or something similar
  • Select who can use it, usually first option "Accounts in this organizational directory only (for example Tietoevry only - Single tenant)" is OK
  • Set Redirect URI to callback URL:

    Code Block
    https://identity.core.tds.CUSTOMERX.com/auth/realms/tds/broker/main-oidc/endpoint


    Note

    It says that it is optional, but it is mandatory in our case.


  • Click "Register"
  • On shown overview screen you shall find and copy following values that will be needed later for setup on Keycloak side:
    • Application (client) ID
    • Directory (tenant) ID
  • Following claims need to enabled:
    • sAMAccountName (onpremisessamaccountname)
    • email
    • firstname
    • lastname
  • AzureAD team must run following powershell commands to properly enable "sAMAccountName" claim

...

We also need to setup process for replacing secret on regular basis according to validity possibilities.

TDS team then takes over and finishes setup according to internal documentation OpenID Connect brokering setup.

ADFS integration with TDS Keycloak using SAML

...