Setting up authentication with Azure AD
The following guide will assist you in configuring your application to use Azure Active Directory for authentication.
Part 1: Configure a new application in Azure AD
Log into portal.azure.com with administrative credentials, select
All servicesand selectAzure Active DirectorySelect
App registrationsand clickNew application registrationEnter
Lithnet Access Manageror another suitable application name, and selectAccounts in this organizational directory only (Lithnet only - Single tenant)as the supported account typeSelect
Webas the application typeIn the
redirect URIfield, enter the base URL where your Access Manager web app is hosted followed by/auth/(eghttps://accessmanager.lithnet.local/auth/)Click
RegisterTake note of the
Application IDvalue, this is our OpenID Connect client IDFrom the left-hand menu, click
Authenticationand thenProperties. Set the Logout URL to be the same as your base URL, with/auth/logoutappended to it. (eghttps://accessmanager.lithnet.local/auth/logout)Save the settings
From the
API permissionspage, use thegrant admin consentif you want to prevent users from being prompted for their consent when logging into the app.From the
Certificates and secretspage, clicknew client secret, give your secret a name, and then take note of the value provided.
Part 2: Configure Lithnet Access Manager
Open the Lithnet Access Manager Service Configuration Tool
Select the
AuthenticationpageSelect
Open ID Connectas the authentication providerUse the
application idobtained from the Azure AD setup process as theclient IDvalueSpecify the
client secretobtained from the Azure AD setup process.Set the authority as appropriate for your tenant eg for
lithnet.ioit would behttps://login.microsoftonline.com/lithnet.io

Part 3: Enable multi-factor authentication
For further security, you can set up a conditional access policy to require multi-factor authentication for the app
Last updated
Was this helpful?