Register a service principal for the Azure AD SCIM Microservice
To access resources secured by your Azure AD tenant, the Azure AD SCIM microservice needs to be represented within the tenant by a security principal. The security principal is an application you create in your tenant to provide the necessary authentication context needed by the microservice to call the Microsoft Graph API.
To register a service principal for the microservice, you need to complete the following tasks:
Generate a self-signed certificate in EmpowerID to authenticate EmpowerID to Azure using the service principal.
Download the certificate to your machine.
Create an application in Azure AD and associate it with the certificate you generated in EmpowerID.
Generate a self-signed certificate in EmpowerID
On the navbar of the EmpowerID Web interface, expand Apps and Authentication > SSO Connections and select SSO Components.
Select the Certificates tab and then click the Add button in the grid header.
Â
Select Generate Self-Signed Certificate.
Â
Enter the following information:
Certificate Owner – Leave empty
Prefer Local Machine Store – Leave empty
Subject Name – Enter something suitable to the purpose of the certificate, such as CN=AzureCertificate
Requires Password – Select this option; this adds a private key to the certificate
Certificate Password – Enter a password for the certificate
Click Save to create the certificate.
Â
Download the certificate in Base64 format
From the Certificate Details page, return to the SSO Components page by clicking the Find Certificates breadcrumb.
On the SSO Components page, select the Certificates tab and search for the certificate you just created.
Â
Click the Name link for the certificate to navigate to the View page for the certificate.
On the View page for the certificate, click Export Certificate.
Â
Select the desired location in which to save the certificate and click Save.
Â
Register a service principal for the Azure AD microservice in Azure
In Azure, navigate to your Azure Active Directory.
On the Azure Active Directory navbar, click App registrations.
On the App registrations page, click New registration.
Â
Name the application, select the supported accounts types (single or multitenant), and click Register.
Once the application is registered, copy the Application (client) ID and Directory (tenant) ID from the Overview page. These values are used later.
Â
Navigate to the Certificates & secrets blade for the application, select the Certificates tab and click Upload certificate.
Â
Select the base-64 encoded certificate you downloaded from EmpowerID and click Add.
The public key certificate that you upload to Azure must have a corresponding private key in the EmpowerID certificate store; otherwise, an error will occur when calling Azure’s API.
IN THIS ARTICLE
Next Steps
Create an App Service for the SCIM microservice
Configure SCIM App Service Authentication
Publish the SCIM Microservice to Azure
Set Permissions for the SCIM Managed Identity
Connect EmpowerID to Azure Active Directory
Â