Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
EmpowerID uses the Azure AD SCIM Microservice to make API calls to your Azure tenant in response to your actions in EmpowerID. As part of the deployment process for the microservice, an app service needs to be created to host the microservice and configured for Azure AD authentication.
Create the app service
In Azure, navigate to All Services > App services and select Addclick Create.
Under Project Details, select a Subscription and Resource Group for the App Service. If desired, you can create a new Resource Group.
Under Instance Details, do the following:
Name – Enter a name for the Web App.
Publish – Select Code.
Runtime Stack – Select .Net Core 3.1 (LTS).
Operating System – Select Linux.
Region – Select the appropriate region.
Under App Service Plan, select an existing Linux Plan or create a new one.
Click Review + Create.
Click Create.
After deployment completes, click Go to Resource and copy the URL from the Overview page. You will need this when you configure the app service for the EmpowerID SCIM Microservice.
Configure authentication
Navigate to the Authentication (classic)blade for the app service and click Add identity provider.
Turn on App Service Authentication.
For Action to take when request is not authenticated, select Log in with Azure Active Directory.
For Authentication Providers, select Azure Active Directory.
Set the Management mode to Advanced and enter the following information:
Client ID – Enter the Client ID for the service principal you registered earlier for EmpowerID.
Issuer Url – Enter On the Add an identity provider page, do the following:
App registration type – Select Pick an existing app registration in this directory.
Name or app ID – Select the service principal you created to provide Azure AD authentication for the microservice.
Issuer URL – Replace the default value with
https://login.microsoftonline.com/
<TenantID>
is the TenantID of the application you registered in Azure AD for EmpowerID.Client Secret – Enter the client secret for the application you registered in Azure AD for EmpowerID.
Allowed Token Audience – Enter the App Service URL.
Click OK to close the Active Directory Authentication dialog.
Image Removed- Back in the main Authentication / Authorization page, click Save.
<Your Tenant ID>
Restrict access – Select Require authentication.
Unauthenticated requests – Select HTTP 401 Unauthorized: recommended for APIs.
Token Store – Leave selected.
Click Add.
Image Added
Select Microsoft.
Create a managed identity for the app service
Navigate to the Identity blade for the app service.
Turn on System assigned to create the managed identity.
Image RemovedImage AddedSave your changes.
Click Save and then click Yes to confirm that you want to enable system assigned managed identity.
Image AddedCopy the Object ID for app service (shown in the above image). You need this later when setting the appServiceObjectID parameter on the PowerShell script used to set permissions Azure AD SCIM managed identity.
Image Added
Download the publish profile for the app service
Navigate to the Overview page for the app service.
Click Get publish profile and save the file to your machine. You use this file when publishing the EmpowerID Azure AD SCIM microservice to Azure.
Next Steps
Publish the Azure AD SCIM Microservice to Azure
Div | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
IN THIS ARTICLE
|
Insert excerpt | ||||||
---|---|---|---|---|---|---|
|