Configure SCIM App Service Authentication

The SCIM Microservice interfaces with EmpowerID and Azure to execute Azure AD operations in response to your actions in EmpowerID. For this to occur, the App Service hosting the SCIM microservice needs to be configured so that it can authenticate to Azure AD and receive identity and access tokens with the necessary permissions to call the relevant Graph API endpoints on your behalf.

To configure the SCIM App Service for authentication involves the following:

  • App Service authentication must be turned on and Login with Azure Active Directory must be enabled

  • Azure Active Directory must be selected as the Identity Provider

  • Information about the application (service principal) you registered in Azure AD must be added to the App Service

  • A system assigned managed identity must be created for the App Service in Azure AD so that the needed permissions can be granted to the SCIM microservice

To configure the SCIM App Service

  1. Log in to your Azure portal as a user with the necessary permissions to configure the App service you created earlier.

  2. In Azure, navigate to the App Service.

  3. Under Settings in the sidebar, select Authentication / Authorization.

  4. Turn on App Service Authentication.

     

  5. Under Action to take when request is not authenticated, select Log in with Azure Active Directory.

     

  6. Under Authentication Providers, click Azure Active Directory.

     

  7. Under Management mode, select Advanced.

     

  8. Enter the following information for the Advanced mode settings:

    • Client ID — Enter the Client ID for the service principal you registered earlier for EmpowerID.

    • Issuer Url — Enter https://login.microsoftonline.com/<TenantID>, where <TenantID> is the TenantID of the application you registered in Azure AD for EmpowerID.

    • Client Secret — Enter the client secret for the application you registered in Azure AD for EmpowerID.

    • Allowed Token Audience — Enter the App Service URL.

      The settings should look similar to the below image:

       

  9. Click OK to close the Active Directory Authentication dialog.

  10. Back in the main Authentication / Authorization page, click Save.

     

  11. Under Settings, select Identity.

  12. Turn on system assigned managed identity and click Save.



  13. Back in the Overview page for the App Service, click Get Publish Profile. You will need this file when you publish the SCIM Microservice to Azure.


Next Steps

Publish the SCIM Microservice to Azure