Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Status
colourYellow
titleDraft

...

  1. Name: Choose a name, used internally and for you to see at first glance what it is

  2. Display name: name is shown to the users on login e.g. Company Access

  3. Type: ADFS, Azure AD, Other 

    1. For Azure select Azure AD 

  4. Protocol: Open ID Connect

    1. The protocol for all authentication in Picturepark is Open ID Connect. 

  5. URL

    1. The Endpoint for OpenID, remove everything after V2.0

    2. Example: https://login.microsoftonline.com/99292bdd-6686-4f0b-817b-f8e8571cf07c/v2.0 (you will need to enter a dummy URL until you have the client id of the application from Azure after the next step regarding what needs to be done in Azure Portal).

    3. You find that in Microsoft Entra ID (formerly known as Azure Active Directory) > Overview - Endpoints > Open ID Connect

  6. Client ID: The Application (client) ID once you have set this up for now enter a dummy id. 

  7. Client Secret: Open Manage > Certificates & Secrets 

  8. Sort order does not need to be filled out it will be created automatically. If you have multiple IdPs and wish to display them in a certain order you can however add a number here eg. 0,1, 2, 3 etc.

  9. Click on create and then copy the following Id you will need it when setting up the Azure portal. 

...

  1. Open Manage > Expose an API

  2. Add a scope 

    1. You'll need to set an Application ID URI before you can add permission. (Microsoft chooses one by default but it can be changed). Save and continue

    2. Scope name: user.signin

    3. Who can consent? Admins only

    4. Consent display names: User Authentication

    5. Consent descriptions: User Authentication

    6. Click Add scope

  3. Add a new client application

    1. Client ID is taken from the Overview page

    2. Select Scopes

...