Setting up authentication with Azure AD
The following guide will assist you in configuring your application to use Azure Active Directory for authentication.
Part 1: Configure a new application in Azure AD
Log into portal.azure.com with administrative credentials, select
All services
and selectAzure Active Directory
Select
App registrations
and clickNew application registration
Enter
Lithnet Access Manager
or another suitable application name, and selectAccounts in this organizational directory only (Lithnet only - Single tenant)
as the supported account typeSelect
Web
as the application typeIn the
redirect URI
field, enter the base URL where your Access Manager web app is hosted followed by/auth/
(eghttps://accessmanager.lithnet.local/auth/
)Click
Register
Take note of the
Application ID
value, this is our OpenID Connect client IDFrom the left-hand menu, click
Authentication
and thenProperties
. Set the Logout URL to be the same as your base URL, with/auth/logout
appended to it. (eghttps://accessmanager.lithnet.local/auth/logout
)Save the settings
From the
API permissions
page, use thegrant admin consent
if you want to prevent users from being prompted for their consent when logging into the app.From the
Certificates and secrets
page, clicknew client secret
, give your secret a name, and then take note of the value provided.
Part 2: Configure Lithnet Access Manager
Open the Lithnet Access Manager Service Configuration Tool
Select the
Authentication
pageSelect
Open ID Connect
as the authentication providerUse the
application id
obtained from the Azure AD setup process as theclient ID
valueSpecify the
client secret
obtained from the Azure AD setup process.Set the authority as appropriate for your tenant eg for
lithnet.io
it would behttps://login.microsoftonline.com/lithnet.io
Part 3: Enable multi-factor authentication
For further security, you can set up a conditional access policy to require multi-factor authentication for the app
Last updated