Microsoft Entra ID configuration
It is necessary to create a new Application Registration within the Microsoft Entra ID tenant for your organisation.
-
Log in to the Azure portal (https://portal.azure.com/).
-
Select Microsoft Entra ID .
-
Select App Registrations .
-
Select New registration .
-
Enter an appropriate name in the Name field (for example: Ontrack Hub). This is displayed when an end user is shown a Consent screen the first time they access the website.
-
Set the Supported account types to 'Accounts' in this organisational directory only:
-
Ontrack websites - the 'Redirect URI', which is optional, should be the URI (for example: https://EBSOntrackhub-tribalcollege.EBS.tribalgroup.com/)
-
intel website - the 'Redirect URI' should be the URI with a suffix of /pi/auth/oAuthComplete (for example: https://EBSintel-tribalcollege.EBS.tribalgroup.com/pi/auth/oAuthComplete)
Important.This URI must use https. Microsoft Entra ID authentication cannot be used on an http website. -
EBS product suite (for example: EBS Central, EBS shape and so on) - the redirect URI can be left blank
-
-
Select Register to create the new registration.
-
Select API Permissions from the App Registration menu.
The API Permissions screen is displayed.
-
Ensure that the User.Read Permission has been configured. If required, you can configure User.Read permissions in the following way:
-
Select Add a permission .
-
Select Microsoft Graph .
-
Select Delegated Permissions .
-
Select User.Read to enable the EBS website to sign in and read the user profile.
-
-
Select Authentication from the App Registration menu.
The Authentication screen is displayed.
-
Configure the Authentication screen in the following ways:.
For Ontrack websites, select the ID tokens check-box in the Implicit grant section and select the Save button.
For the EBS product suite (for example: EBS Central, EBS shape and so on), select Add a platform and select Mobile and desktop application . Select the Redirect URI option - https://login.microsoftonline.com/common/oauth2/nativeclient)
-
Select Certificates & secrets from the App Registration menu.
Important.The Client Secret (steps 12 - 16) is not required to use Microsoft Entra ID authentication in Central or Shape– it is only necessary for Ontrack website integrationThe Certificates & secrets screen is displayed.
-
Select Create a New client secret .
-
Enter an appropriate description in the Description field.
-
Enter expiry details in the Expiry Details field.
-
Copy the value stored in the Client Secret field.
Important.You must copy the value stored in the Client Secret field as you will be unable to retrieve it later. -
Select the Overview screen.
In the following sections you will need to use the following pieces of information:
-
The Application (client) ID
-
The Directory (tenant) ID
-
Further configuration steps include:
Microsoft Entra ID gives you several options for managing Consent for an application, including asking end users for consent at the first time of access, or triggering a consent workflow approval step.
Alternatively, it is possible to grant admin consent on behalf of users.
Select Grant admin consent for <tenant name> from the API Permissions menu.
You can configure further optional branding steps for end users that are presented with consent dialogue.
To configure branding steps:
Select Branding from the App Registration menu.
The Branding screen is displayed, where you can:
-
Amend the name
-
Upload a logo
-
Add a home page URL
-
Publisher domain