SSO configuration (to be carried out by the customer)
The following information in bold is required to set up the customer’s Azure Active Directory as an
external identity provider (IdP) towards the Compello ID Azure AD B2C directory.
- Application ID of the Compello PROCESS application registered in the customer’s Azure AD
tenant. - Application Secret value and Expiration Date of the registered application.
- OpenID Connect metadata endpoint of the registered application.
By following the steps below, the customer will be able to obtain the above information:
- Open a web browser and log in to the customer’s Azure Portal
- Choose the directory that contains the customer’s Azure AD tenant in Azure Portal
- Select App registrations
- Select New registration.
- Enter a name for the application (e.g. Compello PROCESS)
- Accept the default selection of Accounts in this organizational directory only.
- For the Redirect URI, use the following information
- Redirect application type: Web
- Value: <https://compellob2c.b2clogin.com/compellob2c.onmicrosoft.com/oauth2/authresp>
- Select Register and copy the Application ID to a text document or similar
- Select Certificates & secrets, and then select New client secret
- Enter a description for the secret, select an expiry date, and then select Add.
- Please note that when the expiry date has passed, users will not be able to log in to
Compello PROCESS until a new secret has been created. As this is a manual process, we
recommend that the expiration is set to 24 months unless this is in conflict with internal
security policies
- Please note that when the expiry date has passed, users will not be able to log in to
- Copy the Application Secret value and the Expiration date to a text document or similar. You
need to do this NOW, as the value will not be available if you get back to this later. If you try to
do it later you will first have to create a new secret value. - Select the Overview and Application Endpoints and copy the OpenID Connect metadata
document endpoint to a text document or similar.
It should be in the following format:
"https://login.microsoftonline.com/<Tenant ID>/v2.0/.well-known/openid-configuration".
Claims mapping (to be done by the customer)
To make sure we have the required information to identify and authenticate the user in Compello
PROCESS, we need to add optional claims data to the token configuration in the customer’s Azure AD
tenant. The default configuration in Azure AD will normally NOT include the user’s email address in the
claims list, so the customer will need to add this manually to the claim to include the email address as
part of the token. If this is not done, the user mapping will not work, as the email address is the primary
field used for user lookup, and users will not be able to log in to Compello PROCESS. Also, to save time
for the user in the user activation process, it is beneficial if the surname, first name and preferred
username is also added to the claim – if not the user will have to add them manually as part of the user
activation. To add the email address and the other fields to the claim, this is done as follows:
- Open a web browser and log in to the customer’s Azure Portal
- Choose the directory that contains the customer’s Azure AD tenant in Azure Portal
- Select App registrations
- Select the application you just registered for the Compello PROCESS integration
- Select Token configuration
- Click Add optional claim.
- Select ID as the Token type.
- Select email, family_name, given_name and preferred_username from the list
- Click the Add
- Turn on the Microsoft Graph permission in the confirmation popup
- Click Add.
- This completes the application registration.
- When users are signing in for the first time, they must grant consent to the Compello PROCESS application that was created above to access their information. They will get a page as follows.
Users must click on Accept to continue signing in.Several issues can arise depending on the security policies of the customer environment.
If users are unable to authorize applications by themselves, administrators must assign the users or groups who will be accessing the Compello PROCESS application manually. Otherwise, users will get an error message like below when they are trying to sign in.If the users must be assigned to the application first, users will get an error like this when they try to sign in.
If an issue regarding user consent occurs while signing, customers will have to check their Active
Directory security policies and grant access to the users accordingly. - This completes the SSO configuration from the customer’s side
Comments
0 comments
Please sign in to leave a comment.