Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

If your organization integrates applications with Azure AD, you can manage those applications in EmpowerID, including assigning certificates to those applications. As a prerequisite to assigning a certificate to an Azure application, the private key for the certificate needs to be uploaded to the EmpowerID certificate store. This is necessary for EmpowerID to call the Graph API on your behalfEmpowerID fulfills the request by uploading the certificate to Azure on your behalf.

Note

In order to create a client certificate for your Azure application, you need to provide the base64 encoded string for the public key. If you do not have a certificate, you can generate one in EmpowerID by following the steps outlined in the below dropdown.

Expand
titleGenerate a self-signed certificate
  1. On the navbar of the EmpowerID Web interface, expand Apps and Authentication > SSO Connections and select SSO Components.

  2. Select the Certificates tab and then click the Add button in the grid header.

    Image Added

     

  3. Select Generate Self-Signed Certificate.

    Image Added

     

  4. Enter the following information:

    • Certificate Owner – Leave empty

    • Prefer Local Machine Store – Leave empty

    • Subject Name – Enter something suitable to the purpose of the certificate, such as CN=AzureCertificate

    • Requires Password – Select this option; this adds a private key to the certificate

    • Certificate Password – Enter a password for the certificate

  5. Click Save to create the certificate.

    Image Added

 

Download the certificate in Base64 format

  1. From the Certificate Details page, return to the SSO Components page by clicking the Find Certificates breadcrumb.

  2. On the SSO Components page, select the Certificates tab and search for the certificate you just created.

    Image Added

     

  3. Click the Name link for the certificate to navigate to the View page for the certificate.

  4. On the View page for the certificate, click Export Certificate.

    Image Added

     

  5. Select the desired location in which to save the certificate and click Save.

The workflow used to assign certificates is the CreateAzureAppCertificate workflow. This workflow has a number of parameters that you can configure to alter the fields that appear when assigning certificates to your Azure applications. In this article, you do the following:

  • Configure the parameters of the CreateAzureAppCertificate workflow for your environment

  • Run the workflow to assign the certificate to an Azure application

Easy html macro
theme{"label":"solarized_dark","value":"solarized_dark"}
contentByMode{"html":"<!doctype html>\r\n<link href=\"https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/bootstrap.min.css\" rel=\"stylesheet\" integrity=\"sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC\" crossorigin=\"anonymous\">\r\n<link href=\"https://docs.empowerid.com/new_docs.css\" rel=\"stylesheet\">\r\n<script src=\"https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/bootstrap.bundle.min.js\" integrity=\"sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM\" crossorigin=\"anonymous\"></script>\r\n <div class = \"bd-callout bd-callout-info\">\r\n <h4>Prerequisites</h4>\r\n <p>To create a certificate for an Azure app, you need:</p>\r\n <ul>\r\n <li>An Azure AD tenant managed by EmpowerID</li>\r\n <li>A target application registered in Azure</li>\r\n <li>As Azure requires the public key to be base64, you need to provide that when assigning the \r\n certificate to your application</li>\r\n </ul>\r\n <p class = \"bd-callout bd-callout-success\">To run the workflow that creates Azure app certificates, users\r\n must have the <b>UI-Res-Admin-MS-Application</b> Management Role.</p>\r\n </div>","javascript":"","css":""}

Configure workflow parameters

The workflow for creating Azure app client secrets is CreateAzureAppCertificate. The workflow has several parameters that affect field valuesused to assign certificates is the CreateAzureAppCertificate workflow. This workflow has a number of parameters that you can configure to alter the fields that appear when assigning certificates to your Azure applications. These parameters are listed in the below table. In this example, you set the DefaultAzureTenantID parameter to the Azure tenant with the applications for which you want to create secretsassign certificates.

Parameter

Purpose

DefaultAzureTenantID

This is the GUID of the Azure tenant. If the value is present, the “Select a Tenant” drop down will be auto-selected with the specified tenant.

Easy html macro
theme{"label":"solarized_dark","value":"solarized_dark"}
contentByMode{"html":"<!doctype html>\r\n<link href=\"https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/bootstrap.min.css\" rel=\"stylesheet\" integrity=\"sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC\" crossorigin=\"anonymous\">\r\n<link href=\"https://docs.empowerid.com/new_docs.css\" rel=\"stylesheet\">\r\n<script src=\"https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/bootstrap.bundle.min.js\" integrity=\"sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM\" crossorigin=\"anonymous\"></script>\r\n <p class = \"bd-callout bd-callout-success\">The tenant you specify here appears by default as the tenant \r\n with the application(s) for which you want to create certificate(s). If you have more than one tenant \r\n managed by EmpowerID, those tenants can be selected on the form. Please note that\r\n once you set a value for this parameter, the value cannnot be null going forward unless you null it in the \r\n EmpowerID Identity Warehouse.</p>\r\n ","javascript":"","css":""}

You can find the Tenant ID for your Azure tenant by navigating to
Azure RBAC Manager > Resources and selecting the Tenants tab.

DefaultEmailMessageName

This is the name of the Email Template used to send email notification to each person belonging to the Management Roles specified in the ManagementRoleIDsToNotifiy parameter. Email notifications are sent each time an app certificate is created.

DefaultExternalCredentialPolicyID

This is the External Credential Policy ID to be assigned to all app certificates created.

DefaultOrgZoneID

This is the ID of the EmpowerID location where the app certificate will be created . If a value is present, the “Select a Location” drop down will be auto-selected with the location. The location can be changed as desired on the form.

DefaultOwnerPersonID

This is the Person ID of the certificate owner. If the value is present, the specified person will be the owner for all app certificates.

DefaultPreApproveOwner

Specifies whether owner requests for access to the certificate are automatically approved by the system.

DefaultShareCredential

Specifies whether to enable sharing for all app certificates by default.

DefaultVaultCredential

Specifies whether to vault all secrets by default

ManagementRoleIDsToNotify

This is a comma separated list of the Management Role IDs of the Management Roles to be notified each time an app certificate is created.

PreApproveOwner_IsVisible

Specifies whether to show or hide the Pre-approve Owner for Access checkbox on the form

ShareCredential_IsVisible

Specifies whether to show or hide the Share credential checkbox on the form

SelectOwner_IsVisible

Specifies whether to show or hide the Owner selection drop-down on the form

VaultCredential_IsVisible

Specifies whether to show or hide the Vault credential checkbox on the form


To configure workflow parameters for your needs, do the following:

  1. On the navbar, expand Object Administration and select Workflows.

  2. Select the Workflow tab and search for Create Azure App Certificate.

  3. Click the Display Name for the workflow.

  4. On the Workflow Details page for the workflow, expand the Request Workflow Parameters accordion and click the edit button for the DefaultAzureTenantID parameter.

  5. Enter the Azure Tenant ID in the Value field and click Save.

  6. Configure any other settings as needed.


Create the certificate for the application

  1. Navigate to the Resource Admin application portal for your environment.

  2. Select Applications from the dropdown menu and then click the Workflows tab.

  3. Click Create Azure Application Certificate.


    This opens the Create Azure Application Certificate wizard, which walks through the process for creating the certificate.

  4. Select the Azure tenant where the target application is hosted.

  5. Select the application.

  6. Click Next.

     

  7. Enter the following information:

    • Certificate Name – Name of the certificate

    • Certificate Description – Description of the certificate

    • Secret Expiration – Select an expiration date for the secret

    • Certificate Base64 Encoded String – Paste in the base64 encoded string for the certificate you uploaded to EmpowerID

    • Select Location – Select a location for the certificate in EmpowerID. Default Organization is selected by default; if you wish to change this, click the Default Organization link and then search for and choose the desired location from the Location tree.

    • Vault this certificate – Select this option to store the certificate in EmpowerID

    • Enable sharing – Select this option to allow others to request access to the certificate; if this option is not selected, users cannot view or perform any actions against the certificate in EmpowerID

    • Client Secret Owner – Search for and select an EmpowerID Person to be the owner of the certificate. This is internal to EmpowerID and has no meaning in Azure; however, the field is bound to people who have accounts in the specified Azure tenant.

    • Pre-approve access for owner – Select this option to allow the owner access to the certificate without requiring further human approval.

  8. Click Next.

  9. Review the information and click Submit.

  10. You should see a fulfillment message stating that the certificate was successfully uploaded to Azure for the designated application.

  11. Click Submit to exit the wizard.

Verify the certificate in Azure

  1. In your Azure tenant, navigate to Azure AD > App registrations.

  2. Search for the application with the certificate you assigned in EmpowerID and click the Display Name link.

  3. Under Manage, select Certificates & secrets and then select the Certificates tab.
    You should see the new certificate.

View the certificate in EmpowerID

If you chose choose to vault and enable sharing for the certificate, the certificate owner can view the certificate and grant others eligibility to check it out as needed.

  1. On the navbar, expand Privileged Access and select Shared Credentials.

  2. Select the All Shared Credentials tab and search for the certificate you created.

    You should see the record for the certificate.

Insert excerpt
IL:External Stylesheet
IL:External Stylesheet
nopaneltrue

Div
stylefloat:left; position:fixed;
idarticleNav

IN THIS ARTICLE

Table of Contents
maxLevel4
minLevel2
stylenone
printablefalse