Create Client Secrets
Azure Application Client Secrets are essential credentials associated with an application's registration within Azure Active Directory (Azure AD). They're predominantly used by server-side applications requiring authentication to access Azure resources or APIs. When you integrate these applications with Azure AD via your organization, their management, including creating new client secrets, can be effectively managed in EmpowerID.
To create these client secrets, the CreateAzureAppClientSecret
workflow is utilized. This workflow provides a range of configurable parameters, which allows you to modify the displayed fields when generating client secrets.
In the following sections of this article, we will walk you through tailoring the workflow parameters to suit your environment. Subsequently, we will guide you on creating a client secret for an application integrated with your Azure AD tenant.
Configure workflow parameters
The workflow for creating Azure app client secrets is CreateAzureAppClientSecret. The workflow has several parameters that affect field values. These parameters are listed in the below table. In this example, you set the DefaultAzureTenantID parameter to the Azure tenant with the applications for which you want to create secrets.
Parameter | Purpose |
---|---|
DefaultAzureTenantID | This is the GUID of the Azure tenant. If the value is present, the “Select a Tenant” drop down will be auto-selected with the specified tenant. You can find the Tenant ID for your Azure tenant by navigating to Click image for an enlarged view |
DefaultEmailMessageName | This is the name of the Email Template used to send email notification to each person belonging to the Management Roles specified in the ManagementRoleIDsToNotifiy parameter. Email notifications are sent each time a client app secret is created. |
DefaultExternalCredentialPolicyID | This is the External Credential Policy ID to be assigned to all client secret credentials created. |
DefaultOrgZoneID | This is the ID of the EmpowerID location where the client secret will be created . If value is present, the “Select a Location” drop down will be auto-selected with the location. The location can be changed as desired on the form. |
DefaultOwnerPersonID | This is the Person ID of the secret owner. If the value is present, the specified person will be the owner for all client app secrets. |
DefaultPreApproveOwner | Specifies whether the Pre-approve access for owner checkbox appears on the form. |
DefaultSecretExpirationInDays | This is the default client secret expiration in X days from the current date. X days will be added to the current date. |
DefaultShareCredential | Specifies whether to enable sharing for all credentials by default. |
DefaultVaultCredential | Specifies whether to vault all secrets by default |
ManagementRoleIDsToNotify | This is a comma separated list of the Management Role IDs of the Management Roles to be notified each time a client app secret is created. |
SelectExpiration_IsVisible | Specifies whether to show or hide the expiration field on the form. |
ShareCredential_IsVisible | Specifies whether to show or hide the Share credential checkbox on the form |
VaultShareCredential | Specifies whether to vault all secrets by default |
VaultCredential_IsVisible | Specifies whether to show or hide the Vault credential checkbox on the form |
SelectAOwner_IsVisible | Specifies whether to show or hide the Owner selection drop-down on the form |
To configure workflow parameters for your needs, do the following:
On the navbar, expand Object Administration and select Workflows.
Select the Workflow tab and search for Create Azure App Client Secret.
Click the Display Name for the workflow.
Expand the Request Workflow Parameters accordion on the Workflow Details page for the workflow and click the edit button for the DefaultAzureTenantID parameter.
Enter the Azure Tenant ID in the Value field and click Save.
Configure any other settings as needed.
Create a client secret for an application
Navigate to the Resource Admin application portal for your environment.
Select Applications from the dropdown menu and then click the Workflows tab.
Click the Create Azure Application Client Secret card.
This opens the Create Azure Application Client Secret wizard, which assists you with creating an Azure application client secret.Select the Azure tenant where the target application is hosted.
Select the application.
Click Next.
Enter the following information:
Secret Name – Name of the secret
Secret Description – Description of the secret
Secret Expiration – Select an expiration date for the secret
Select Location – Select a location for the secret in EmpowerID. Default Organization is selected by default; if you wish to change this, click the Default Organization link and search for and choose the desired location from the Location tree.
Vault this credential – Select this option to store the secret in EmpowerID
Enable sharing – Select this option to allow others to request access to the secret; if this option is not selected, users cannot view or perform any actions against the secret in EmpowerID
Client Secret Owner – Search for and select an EmpowerID Person to be the owner of the secret. This is internal to EmpowerID and has no meaning in Azure; however, the field is bound to people with accounts in the specified Azure tenant.
Pre-approve access for owner – Select this option to allow the owner access to the secret without requiring further human approval.
Click Next.
Review the information and click Submit.
You should see the client secret you just created for the application. If desired, copy the client secret and store it securely.
Click Submit to exit the wizard.
Verify the secret in Azure
In your Azure tenant, navigate to Azure AD > App registrations.
Search for the application with the secret you created in EmpowerID and click the Display Name link.
Under Manage, select Certificates & secrets.
You should see the new secret.
View the secret in EmpowerID
If you chose to vault the secret in EmpowerID, the secret owner can view it and share it with others as needed.
On the navbar, expand Privileged Access and select Shared Credentials.
Select the All Shared Credentials tab and then search for the client secret you created.
You should see the record for the secret.