You are viewing an earlier version of the admin guide. For the latest version, please visit EmpowerID Admin Guide v7.211.0.0.

Create Azure Application Client Secrets

If your organization integrates applications with Azure AD, you can manage those applications in EmpowerID, including creating new client secrets for those applications. The workflow used to create client secrets is the CreateAzureAppClientSecret workflow. This workflow has a number of parameters that you can configure to alter the fields that appear when creating client secrets. In this article, you test configuring the workflow parameters for your environment and then create a client secret for an application integrated with your Azure AD tenant.

Configure workflow parameters

The workflow for creating Azure app client secrets is CreateAzureAppClientSecret. The workflow has several parameters that affect field values. These parameters are listed in the below table. In this example, you set the DefaultAzureTenantID parameter to the Azure tenant with the applications for which you want to create secrets.

Parameter

Purpose

DefaultAzureTenantID

This is the GUID of the Azure tenant. If the value is present, the “Select a Tenant” drop down will be auto-selected with the specified tenant.

You can find the Tenant ID for your Azure tenant by navigating to
Azure RBAC Manager > Resources and selecting the Tenants tab.

Click image for an enlarged view

DefaultOrgZoneID

This is the ID of the EmpowerID location where the client secret will be created . If value is present, the “Select a Location” drop down will be auto-selected with the location. The location can be changed as desired on the form.

DefaultSecretExpirationInDays

This is the default client secret expiration in X days from the current date. X days will be added to the current date.

SelectExpiration_IsVisible

Boolean value that specifies whether to show or hide the expiration field on the form.

DefaultShareCredential

Boolean value that specifies whether to enable sharing for all credentials by default.

ShareCredential_IsVisible

Boolean value that specifies whether to show or hide the Share credential checkbox on the form

VaultShareCredential

Boolean value that specifies whether to vault all secrets by default

VaultCredential_IsVisible

Boolean value that specifies whether to show or hide the Vault credential checkbox on the form

DefaultOwnerPersonID

This is the Person ID of the secret owner. If the value is present, the specified person will be the owner for all client app secrets.

SelectAOwner_IsVisible

Boolean value that specifies whether to show or hide the Owner selection drop-down on the form

DefaultExternalCredentialPolicyID

This is the External Credential Policy ID to be assigned to all client secret credentials created.

ManagementRoleIDsToNotify

This is a comma separated list of the Management Role IDs of the Management Roles to be notified each time a client app secret is created.

DefaultEmailMessageID

This is the ID of the Email Template used to send email notification to each person belonging to the Management Roles specified in the ManagementRoleIDsToNotifiy parameter. Email notifications are sent each time a client app secret is created.


To configure workflow parameters for your needs, do the following:

  1. On the navbar, expand Object Administration and select Workflows.

  2. Select the Workflow tab and search for Create Azure App Client Secret.

  3. Click the Display Name for the workflow.

     

  4. On the Workflow Details page for the workflow, expand the Request Workflow Parameters accordion and click the edit button for the DefaultAzureTenantID parameter.

     

  5. Enter the Azure Tenant ID in the Value field and click Save.

     

  6. Configure any other settings as needed.


Create a client secret for an application

  1. Navigate to the Resource Admin application portal for your environment.

  2. Select Applications from the dropdown menu and then click the Workflows tab.

  3. Click the Create Azure Application Client Secret card.


    This opens the Create Azure Application Client Secret wizard, which assists you with creating an Azure application client secret.

     

  4. Select the Azure tenant where the target application is hosted.

  5. Select the application.

  6. Click Next.

     

  7. Enter the following information:

    • Secret Name – Name of the secret

    • Secret Description – Description of the secret

    • Secret Expiration – Select an expiration date for the secret

    • Select Location – Select a location for the secret in EmpowerID. Default Organization is selected by default; if you wish to change this, click the Default Organization link and then search for and choose the desired location from the Location tree.

    • Vault this credential – Select this option to store the secret in EmpowerID

    • Enable sharing – Select this option to allow others to request access to the secret; if this option is not selected, users cannot view or perform any actions against the secret in EmpowerID

    • Client Secret Owner – Search for and select an EmpowerID Person to be the owner of the secret. This is eternal to EmpowerID and has no meaning in Azure; however, the field is bound to people who have accounts in the specified Azure tenant.

  8. Click Next.

     

  9. Review the information and click Submit.

  10. You should see the client secret you just created for the application. If desired, copy the client secret and store it in a secure location.

     

  11. Click Submit to exit the wizard.

Verify the secret in Azure

  1. In your Azure tenant, navigate to Azure AD > App registrations.

  2. Search for the application with the secret you created in EmpowerID and click the Display Name link for it.

     

  3. Under Manage, select Certificates & secrets.
    You should see the new secret.

 

View the secret in EmpowerID

If you chose to vault the secret in EmpowerID, the secret owner can view the secret and share it with others as needed.

  1. On the navbar, expand Privileged Access and select Shared Credentials.

  2. Select the All Shared Credentials tab and then search for the client secret you created.

    You should see the record for the secret.