Configure SSO for Azure
Before you begin
You must have an APEX AIOps Incident Management Login Redirect URL. To obtain a URL, go Settings > Single Sign-On (SSO).
Familiarize yourself with this procedure for disabling SSO to prevent locking users out of Incident Management if the SSO configuration fails.
Create an application in Azure
Before you configure the OIDC properties, you need to create an Azure application that represents Incident Management. See also Quickstart: Add an enterprise application in the Azure docs.
Navigate to Azure Active Directory > Enterprise Applications > Add Enterprise Application. This opens the Active Directory Gallery.
In the Azure Active Directory Gallery, click create your own application. and do the following:
Select Register an application to integrate with Azure AD (App you're developing) , enter the application name (IncidentManagement), and then click create.
Select Accounts in this organizational directory only (Moog-test only - Single tenant) to restrict the accessibility.
For Redirect URI, select Web type and paste the login redirect URL from the Single Sign On page in Incident Management.
Click Register.
Navigate to Azure Active Directory > Enterprise Applications > IncidentManagement and copy the Application (client) ID in the properties section. You will need this when you set up SSO in Incident Management.
Configure users, groups, and roles for the application
By default, the application has no users or permissions defined. It is good practice to configure your application to allow only authorized users to perform authorized actions, and that Azure users have received their emails set in their Azure user profiles.
Note
For more information on creating app roles in Azure, see the Microsoft article Add app roles to your application and receive them in the token.
Azure does not expose groups by default so the values in the application manifest must be overriden, as shown here: Configuring optional claims .
Under Azure Services, click Active Directory.
Under Manage, click App Registrations.
In the Display name list, click the link to your app.
Under Manage, click App Roles.
Click Create app role.
Enter a display name.
Select User/Groups.
Add any preferred information in the Value and Description fields.
Ensure that Do you want to enable this app role is selected.
Repeat steps a through d for each app role your organization requires.
Add the app role to the application:
Navigate back to Azure Active Directory.
Under Manage, click All applications.
Select the application that you want to use from the list.
Under Manage, click Users and groups.
Add a user group:
Click +Add user/group.
Enter a name for the group.
Select Group as the object type.
Select the app role for the group (created in the previous section).
Configure the roles in Incident Management:
In Incident Management, navigate to Settings > Single Sign On (SSO), and then click Configure in the OpenID Connect box.
Click the Configuration tab and complete the optional setup sections:
Note
It is a best practice to complete the rest of your SSO configuration first, test your setup, and then add scopes and mappings after you have confirmed SSO is working correctly.
Configure redirection and secrets
To configure redirection, go to Azure Active Directory > App registrations.
Click All Applications and select the application (IncidentManagement) you just created.
You can obtain Directory (tenant) ID from the overview > essentials section.
Click Authentication and verify that the Redirect URL is correct.
Click Certificates & secrets > new client secret for creating client secret. This opens a wizard tab for specifying the secret description and expiration. Click Add to add secrets.
Copy the value of the secret for future use.
Incident Management configuration
In the Incident Management UI, go to Settings > Single Sign-On (SSO), and then click Configure in the OpenID Connect (OIDC) box.
For Issuer URL, paste the following URL and replace
{tenant}
with your Azure Active Directory (tenant) ID:https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration
Paste your application ID into the Client ID field.
Paste the Azure AD application secret value to Client Secret.
Add your email domain to the Domains list and click Save.
Click Test and then Test Now. This takes you to the Microsoft login page. Enter your credentials and Sign in. If you have configured all the previous steps, you should then see the “it works” page in the Incident Management UI.
In the Incident Management UI, click Enable.
Configure SSO to support multiple tenants
If you have multiple Incident Management instances and want to use the same SSO configuration with all of them, you must complete an additional procedure for supporting multiple tenants.