You are viewing an earlier version of the admin guide. For the latest version, please visit EmpowerID Admin Guide v7.211.0.0.

Skip to end of banner
Go to start of banner

Create Client Certificates

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 7 Current »

If your organization integrates applications with Azure AD, you can manage those applications in EmpowerID, including assigning certificates to those applications. EmpowerID fulfills the request by uploading the certificate to Azure on your behalf.

In order to create a client certificate for your Azure application, you need to provide the base64 encoded string for the public key. If you do not have a certificate, you can generate one in EmpowerID by following the steps outlined in the below dropdown.

 Generate a self-signed certificate
  1. On the navbar of the EmpowerID Web interface, expand Apps and Authentication > SSO Connections and select SSO Components.

  2. Select the Certificates tab and then click the Add button in the grid header.

     

  3. Select Generate Self-Signed Certificate.

     

  4. Enter the following information:

    • Certificate Owner – Leave empty

    • Prefer Local Machine Store – Leave empty

    • Subject Name – Enter something suitable to the purpose of the certificate, such as CN=AzureCertificate

    • Requires Password – Select this option; this adds a private key to the certificate

    • Certificate Password – Enter a password for the certificate

  5. Click Save to create the certificate.

 

Download the certificate in Base64 format

  1. From the Certificate Details page, return to the SSO Components page by clicking the Find Certificates breadcrumb.

  2. On the SSO Components page, select the Certificates tab and search for the certificate you just created.

     

  3. Click the Name link for the certificate to navigate to the View page for the certificate.

  4. On the View page for the certificate, click Export Certificate.

     

  5. Select the desired location in which to save the certificate and click Save.

The workflow used to assign certificates is the CreateAzureAppCertificate workflow. This workflow has a number of parameters that you can configure to alter the fields that appear when assigning certificates to your Azure applications. In this article, you do the following:

  • Configure the parameters of the CreateAzureAppCertificate workflow for your environment

  • Run the workflow to assign the certificate to an Azure application

Configure workflow parameters

The workflow used to assign certificates is the CreateAzureAppCertificate workflow. This workflow has a number of parameters that you can configure to alter the fields that appear when assigning certificates to your Azure applications. These parameters are listed in the below table. In this example, you set the DefaultAzureTenantID parameter to the Azure tenant with the applications for which you want to assign certificates.

Parameter

Purpose

DefaultAzureTenantID

This is the GUID of the Azure tenant. If the value is present, the “Select a Tenant” drop down will be auto-selected with the specified tenant.

You can find the Tenant ID for your Azure tenant by navigating to
Azure RBAC Manager > Resources and selecting the Tenants tab.

DefaultEmailMessageName

This is the name of the Email Template used to send email notification to each person belonging to the Management Roles specified in the ManagementRoleIDsToNotifiy parameter. Email notifications are sent each time an app certificate is created.

DefaultExternalCredentialPolicyID

This is the External Credential Policy ID to be assigned to all app certificates created.

DefaultOrgZoneID

This is the ID of the EmpowerID location where the app certificate will be created . If a value is present, the “Select a Location” drop down will be auto-selected with the location. The location can be changed as desired on the form.

DefaultOwnerPersonID

This is the Person ID of the certificate owner. If the value is present, the specified person will be the owner for all app certificates.

DefaultPreApproveOwner

Specifies whether owner requests for access to the certificate are automatically approved by the system.

DefaultShareCredential

Specifies whether to enable sharing for all app certificates by default.

DefaultVaultCredential

Specifies whether to vault all secrets by default

ManagementRoleIDsToNotify

This is a comma separated list of the Management Role IDs of the Management Roles to be notified each time an app certificate is created.

PreApproveOwner_IsVisible

Specifies whether to show or hide the Pre-approve Owner for Access checkbox on the form

ShareCredential_IsVisible

Specifies whether to show or hide the Share credential checkbox on the form

SelectOwner_IsVisible

Specifies whether to show or hide the Owner selection drop-down on the form

VaultCredential_IsVisible

Specifies whether to show or hide the Vault credential checkbox on the form


To configure workflow parameters for your needs, do the following:

  1. On the navbar, expand Object Administration and select Workflows.

  2. Select the Workflow tab and search for Create Azure App Certificate.

  3. Click the Display Name for the workflow.

  4. On the Workflow Details page for the workflow, expand the Request Workflow Parameters accordion and click the edit button for the DefaultAzureTenantID parameter.

  5. Enter the Azure Tenant ID in the Value field and click Save.

  6. Configure any other settings as needed.


Create the certificate for the application

  1. Navigate to the Resource Admin application portal for your environment.

  2. Select Applications from the dropdown menu and then click the Workflows tab.

  3. Click Create Azure Application Certificate.


    This opens the Create Azure Application Certificate wizard, which walks through the process for creating the certificate.

  4. Select the Azure tenant where the target application is hosted.

  5. Select the application.

  6. Click Next.

     

  7. Enter the following information:

    • Certificate Name – Name of the certificate

    • Certificate Description – Description of the certificate

    • Secret Expiration – Select an expiration date for the secret

    • Certificate Base64 Encoded String – Paste in the base64 encoded string for the certificate you uploaded to EmpowerID

    • Select Location – Select a location for the certificate in EmpowerID. Default Organization is selected by default; if you wish to change this, click the Default Organization link and then search for and choose the desired location from the Location tree.

    • Vault this certificate – Select this option to store the certificate in EmpowerID

    • Enable sharing – Select this option to allow others to request access to the certificate; if this option is not selected, users cannot view or perform any actions against the certificate in EmpowerID

    • Client Secret Owner – Search for and select an EmpowerID Person to be the owner of the certificate. This is internal to EmpowerID and has no meaning in Azure; however, the field is bound to people who have accounts in the specified Azure tenant.

    • Pre-approve access for owner – Select this option to allow the owner access to the certificate without requiring further human approval.

  8. Click Next.

  9. Review the information and click Submit.

  10. You should see a fulfillment message stating that the certificate was successfully uploaded to Azure for the designated application.

  11. Click Submit to exit the wizard.

Verify the certificate in Azure

  1. In your Azure tenant, navigate to Azure AD > App registrations.

  2. Search for the application with the certificate you assigned in EmpowerID and click the Display Name link.

  3. Under Manage, select Certificates & secrets and then select the Certificates tab.
    You should see the new certificate.

View the certificate in EmpowerID

If you chose to vault and enable sharing for the certificate, the certificate owner can view the certificate and grant others eligibility to check it out as needed.

  1. On the navbar, expand Privileged Access and select Shared Credentials.

  2. Select the All Shared Credentials tab and search for the certificate you created.

    You should see the record for the certificate.

  • No labels