Skip to content

Azure Active Directory Services⚓︎

More and more companies use cloud services. Therefore, also the management of users is outsourced. Instead of a classic Active Directory via LDAP, an Azure AD is used more often. Password Secure integrates the possibility to bring in users and roles from Azure. To use users and roles from multiple Azure ADs, you can create multiple profiles.

Introduction⚓︎

Differences to the LDAP connection⚓︎

The connection to the Azure AD differs in one special point from the connection to a conventional Active Directory. While Password Secure queries the users, groups, and roles actively from the conventional AD, the Azure AD is pushing them automatically to our server. For this a so-called SCIM service is used.

To login to Password Secure, after entering the username a popup opens for the authentication with the entered Microsoft account. Here, a possible configured second factor is also requested. The authentication is handled via the Open ID Connect protocol.

Linking Azure AD⚓︎

Below you will find instructions on how to connect Azure AD to Password Secure. In the Azure portal, go to the management page of your Azure Active Directory. Use an account with administrative permissions for this. During this, login to Password Secure with an account that has the user right "Display organisational structure module", "Can manage Azure AD profiles", and "Can create new Azure AD profiles" enabled.

Setup⚓︎

New Azure application⚓︎

Login to the Azure portal and go to the management page of your Azure Active Directory.

Note

You need an account with administrative permissions

  • Write down your "Tenant ID" shown in the Azure console or by using PowerShell:
Connect-AzureAD
  • Navigate in your Azure AD to "Enterprise applications"
  • Add an own application, that is not listed in the Azure Gallery – in our example, we name it "Password Secure"

Note

A key feature of Password Secure is, that it is self-hosted by our customers. However, to be listed in Azure Gallery, a SaaS model is required. Therefore, Password Secure is not available in the Azure Gallery.

  • When the application was created successfully, you are redirected to it automatically
  • Write down the "Application ID"
  • In the navigation, click "Users and groups"
  • Add the Users and groups that should be available to Password Secure

Be aware

The import of Azure groups as Password Secure roles is only possible if you have booked the Azure package Azure AD Premium P2!

  • Navigate to the "Provisioning" page
  • Configure the Provisioning Mode to "Automatic"

Password Secure Azure AD configuration⚓︎

Info

Your Password Secure user need the following permissions:

  • Display organisational structure module
  • Can manage Azure AD profiles
  • Can create new Azure AD profiles
  • Navigate to the module "Organisational structure"
  • In the toolbar, click on "Manage profiles" in the category "Azure AD"
  • Create the profile with your information
  • Insert the Tenant ID and the Application ID
  • As soon as the profile has been saved, a popup opens for generating a token
  • Choose a desired expiration date (max. 10 years) and click "Generate token"
  • Write down the values of the fields "Tenant URL" and "Secret Token"

Azure provisioning configuration⚓︎

Fill the fields "Tenant URL" and "Secret Token" with the information provided by Password Secure Click "Test Connection" When the test has been successful, click on "Save" at the top of the page Back on the "Provisioning" page, click "Start provisioning" In the settings of the provisioning, check if "Provisioning Status" is set to "On" All allocated users and groups are created in Password Secure now

Hint

Azure´s default provisioning interval is 40 Minutes. So it may some time until the users and roles are shown in Password Secure.

Be aware

Please note that Azure establishes the connection to Password Secure. For this, the client URL must be accessible from an external network / provisioning agent and any used SSL certificate must be valid! If the users are not created in Password Secure, consult the Azure Enterprise Application Provisioning log for more information.

Azure login configuration⚓︎

To enable the Azure login for your users, a few more steps are required:

  • Navigate to the Overview page of your Azure AD
  • Navigate to "App registrations"
  • If no application is displayed, click "All applications"
  • Click on "Netwrix Corporation Password Secure" and navigate to "Authentication"
  • Click on "Add a platform", select "Mobile and desktop applications" and configure the required URIs:
Client URI
WebClient https://WEBCLIENT_URL/authentication/login-via-oidc
FullClient & SSO Agent https://login.microsoftonline.com/common/oauth2/nativeclient
iOS & Android psrmobile://auth
Google Chrome Extension https://bpjfchmapbmjeklgmlkabfepflgfckip.chromiumapp.org
Microsoft Edge Extension https://ahdfobpkkckhdhbmnpjehdkepaddfhek.chromiumapp.org
Firefox Extension https://28c91153e2d5b36394cfb1543c897e447d0f1017.extensions.allizom.org/

Be aware

In order to use Azure login with the desktop client, WebView2 from Microsoft must be installed on the client device.

Set API permissions⚓︎

Finally, the API permissions for the Azure API have to be set, so the login to Password Secure can be performed successfully.

Navigate to "API permissions" and click "Add a permission" Select "Microsoft Graph" and then "Delegated permissions" Set the checkboxes for "openid" and "profile" just under "OpenId permissions" Click on "Add permissions" Click on "Grant admin consent for YOUR_AD_NAME"


Last update: 2022-09-05
Created: 2022-09-05