Azure Active Directory - Setting Up Identity Provider (SSO)

circle-check

Required User Credentials

Overview

This guide explains how to integrate Azure Active Directory with Flosum Cloud Apps to enable Single Sign-On (SSO) for seamless login.

circle-info

For more general instructions about adding an Identity Provider, see the following article.

circle-exclamation

Customer-Hosted

Outline Of Steps Involved

  • Create an Azure Active Directory App

  • Set the Redirect URL

  • Determin Issuer URL

  • Obtain the Client ID and Client Secret

  • Create an Identity Provider with Flosum Global Settings

  • Test the SSO

Configuring Azure Active Directory for Flosum Cloud Apps

This section shows you how to configure an Azure Active Directory App to work with Flosum Cloud Apps for SSO.

circle-exclamation
1

Register an App in Azure Active Directory

  1. Navigate to the Azure portal.

  2. Access the Azure Active Directory service.

  3. Click on the Add button.

  4. From the dropdown options, select App registration.

2

Complete the App Registration

  1. Enter a name for your application in the Name field.

  2. Select the Supported account types based on your organization's requirements.

  3. Input the Redirect URI where Azure AD will send the authentication response.

  4. In the Callback URL field, add the URL of your region for each Flosum Cloud App you want to use with SSO. See the table below for the URLs for your region.

Flosum Cloud App
Callback URL

Global Settings

https://global-us.flosum.app/api/v1/oauth/callback

Backup & Archive

https://backup-us.flosum.app/api/v1/oauth/callback

DevOps

https://devops-us.flosum.app/api/v1/oauth/callback

3

Set Up Authentication and Logout URL

  1. Navigate to the Authentication section.

  2. In the Logout URL field, add the URL of your region for each Flosum Cloud App you want to use with SSO. See the table below for the URLs for your region. Note: This field is mandatory.

Flosum Cloud App
Sign-Out URL

Global Settings

https://global-us.flosum.app/api/v1/oauth/login

Backup & Archive

https://backup-us.flosum.app/api/v1/oauth/login

DevOps

https://devops-us.flosum.app/api/v1/oauth/login

4

Generate a New Client Secret

  1. Proceed to the Certificates & Secret section.

  2. Click New client secret.

  3. Fill in the necessary details.

  4. Click Add to generate the secret.

5

Retrieve the Issuer URL

circle-info

You will need the ISSUER_BASE_URL value when creating the Identity Provider in Flosum Global Settings.

  1. Navigate to App registrations in Azure Active Directory.

  2. Select your App Name and go to the Overview section.

  3. Find and copy the ISSUER_BASE_URL, which will appear like https://login.microsoftonline.com/<tenant id>

6

Retrieve the Client ID and Client Secret

circle-info

You will need the Application (client) ID and Client Secrets Value when creating the Identity Provider in Flosum Global Settings.

  1. In Azure Active Directory, go to App registrations.

  2. Select your App Name.

  3. Your client ID will be listed under Application (client) ID; copy the value.

  4. In the Certificates & secrets section, find and copy the Value under the Client Secret tab.

Create Identity Provider In Global Settings

1

Create Identity Provider

Log in to Flosum Global Settings by following the instructions in the linked article.

circle-info

For more general instructions about adding an Identity Provider, see the following article.

  1. Click Identity Providers from the sidebar menu.

  2. Click Create.

  3. Enter a Name for the identity provider.

  4. Click the Type dropdown menu.

  5. Select OPEN_ID.

  6. Enter the values you saved from your Azure Active Directory into the following fields in the OpenId Information on the Create Identity Provider form.

Azure Active Directory
Global Settings

Application (client) ID

Client ID

Client Secrets Value

Client Secret

ISSUER_BASE_URL

Issuer

  1. In the Button Text textbox, enter a label to be displayed on the login button on the login screen.

  2. Click Save.

2

Log In to Flosum Cloud Apps Using Azure Active Directory

After configuring Azure Active Directory and adding the Identity Provider, test your SSO implementation by logging in to Flosum Global Settings.

circle-info

Tenant Name Log In

SSO is only available when logging in with your Tenant Name.

circle-exclamation

No SSO Button

  1. Open the Flosum Cloud App to log in.

  2. Click Use tenant name.

  3. Enter Tenant Name.

  4. Click the SSO button created by your system administrator.

circle-info

This button may be labeled differently from the screenshot above. Ask your system administrator if you are unsure which button to click.

  1. Complete the login with your SSO provider.

Last updated

Was this helpful?