Setting up authentication with Azure AD
The following guide will assist you in configuring your application to use Azure Active Directory for authentication.
Part 1: Configure a new application in Azure AD
Log into portal.azure.com with administrative credentials, select
All services
and selectAzure Active Directory
Select
App registrations
and clickNew application registration
Enter
Lithnet Access Manager
or another suitable application name, and selectAccounts in this organizational directory only (Lithnet only - Single tenant)
as the supported account typeIn the
redirect URI
field, enter the base URL where your Access Manager web app is hosted followed by/auth
(e.g.https://accessmanager.lithnet.local/auth
)Click
Register
Take note of the
Application ID
value, this is our OpenID Connect client IDFrom the left-hand menu, click
Authentication
. Set the Logout URL to be the same as your base URL, with/auth/logout
appended to it. (e.g.https://accessmanager.lithnet.local/auth/logout
)Save the settings
From the
API permissions
page, use thegrant admin consent
option to prevent users from being prompted for their consent when logging into the app.From the
Certificates and secrets
page, clicknew client secret
, give your secret a name, and then take note of the value provided.
Part 2: Configure Lithnet Access Manager
Open the Lithnet Access Manager Service Configuration Tool
Select the
App configuration\User Authentication
pageSelect
Open ID Connect
as the authentication providerUse the
application id
obtained from the Azure AD setup process as theclient ID
valueSpecify the
client secret
obtained from the Azure AD setup process.Set the authority as appropriate for your tenant (e.g. for
lithnet.io
it would behttps://login.microsoftonline.com/lithnet.io
)
Part 3: Enable multifactor authentication
For further security, you can set up a conditional access policy to require multifactor authentication for the app
Last updated