Comment on page
Setting up authentication with Azure AD
The following guide will assist you in configuring your application to use Azure Active Directory for authentication.
App registrationsand click
New application registration
Lithnet Access Manageror another suitable application name, and select
Accounts in this organizational directory only (Lithnet only - Single tenant)as the supported account type
- 4.In the
redirect URIfield, enter the base URL where your Access Manager web app is hosted followed by
- 6.Take note of the
Application IDvalue, this is our OpenID Connect client ID
- 7.From the left-hand menu, click
Authentication. Set the Logout URL to be the same as your base URL, with
/auth/logoutappended to it. (e.g.
- 8.Save the settings
- 9.From the
API permissionspage, use the
grant admin consentoption to prevent users from being prompted for their consent when logging into the app.
- 10.From the
Certificates and secretspage, click
new client secret, give your secret a name, and then take note of the value provided.
- 1.Open the Lithnet Access Manager Service Configuration Tool
- 2.Select the
App configuration\User Authenticationpage
Open ID Connectas the authentication provider
- 4.Use the
application idobtained from the Azure AD setup process as the
- 5.Specify the
client secretobtained from the Azure AD setup process.
- 6.Set the authority as appropriate for your tenant (e.g. for
lithnet.ioit would be
For further security, you can set up a conditional access policy to require multifactor authentication for the app