Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Go to https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps
  • Click "New registration"
  • Set name "Tietoevry DevOps Space (TDS) Keycloak" or something similar
  • Select who can use it, usually first option "Accounts in this organizational directory only (for example Tietoevry only - Single tenant)" is OK
  • Set Redirect URI to callback URL:

    Code Block
    https://identity.core.tds.CUSTOMERX.com/auth/realms/tds/broker/main-oidc/endpoint


    Note

    It says that it is optional, but it is mandatory in our case.


  • Click "Register"
  • On shown overview displayed "Overview" screen you shall find and copy following values that will be needed later for setup on Keycloak side:
    • Application (client) ID
    • Directory (tenant) ID
  • Following claims need to enabled:
    • sAMAccountName (onpremisessamaccountname)
    • email
    • firstname
    • lastname
  • Generate Client Secret
    • Go to "Certificates & secrets"
    • Click "New client secret"
      • Provide some description like "keycloak" or "CustomerX Keycloak"
      • Make secret valid for as long period as applicable or possible - usually maximum number of months that organisation allows or even infinity.
        • Remember to generate new secrets on regular basis as security measure. Implementing process for replacing secret on regular basis according to validity possibilities is highly recommended.
      • Click "Add"
      • Now you MUST copy "Value" of new secret otherwise it will disappear soon. It will be needed later for setup on Keycloak side.
  • AzureAD team must run following powershell commands to properly enable "sAMAccountName" claim

...

AttributeExample/template value
Authorization URLhttps://login.microsoftonline.com/<TENANT-ID>/oauth2/v2.0/authorize
Token URLhttps://login.microsoftonline.com/<TENANT-ID>/oauth2/v2.0/token
Client IDb1a10f18-5456-47c3-9843-d90cd58c5278
Client Secret

m4yg87DR-_juvp~Tv4U9w-q9x8Mzmo~1LpPlease make secret valid for as long applicable period as possible - infinity or maximum number of months that organisation allows.

We also need to setup process for replacing secret on regular basis according to validity possibilities.

TDS team then takes over and finishes setup according to internal documentation Identity broker Azure AD OpenID Connect brokering setupsetup#Keycloakpart.

Azure AD integration with TDS Keycloak using SAML

...