# Azure Active Directory

This page provides a walkthrough to configure Azure Active Directory as an external identity provider for Akamas users.

{% hint style="info" %}
You will need an Azure account with the `Application.ReadWrite.All` permission, required to create *app registrations* in your Azure AD tenant.
{% endhint %}

## Configure the App registration

To integrate Akamas with your Active Directory, you first need a dedicated *App registration* in your Azure Organization. If you want to use an existing registration, skip to [Get the client configuration](#get-the-client-configurations); to create a new one, refer to the following sub-section.

{% hint style="info" %}
​​Multiple Akamas instances can share the same *app registration*. It implies that any AD user added to a registration could access all the associated Akamas instances.

If you need to manage accesses with finer granularity, create a dedicated registration for each Akamas installation.
{% endhint %}

### Create a new App registration

To create a new registration, navigate to ["App registrations"](https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationsListBlade) in your Azure portal and select "New registration" and specify the following:

* a *name* for the application
* the *account type* that best suits your use case

Complete the creation by clicking on "Register".

<figure><img src="https://3774185011-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FJSNpKvJ3IYa5Vo69I0ed%2Fuploads%2Fgit-blob-29e504703dd39ba239f749eb66df426289b7c432%2Fazure_new_app.png?alt=media" alt=""><figcaption></figcaption></figure>

### Get the client configuration

On the "Overview" page of the application, note the following values:

* *Application (client) ID*

<figure><img src="https://3774185011-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FJSNpKvJ3IYa5Vo69I0ed%2Fuploads%2Fgit-blob-5dfab9b131de5518522654f155f1d07bb968291e%2Fazure_auth_appid.png?alt=media" alt=""><figcaption></figcaption></figure>

* *OpenID Connect metadata document* (found in the "Endpoints" side panel)

<figure><img src="https://3774185011-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FJSNpKvJ3IYa5Vo69I0ed%2Fuploads%2Fgit-blob-f5316b6183c2eb8b4963c598e005f85ea7ccf924%2Fazure_auth_config.png?alt=media" alt=""><figcaption></figcaption></figure>

Furthermore, in the "Certificates & secrets" section, create a new *Client secret* and note its value.

<figure><img src="https://3774185011-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FJSNpKvJ3IYa5Vo69I0ed%2Fuploads%2Fgit-blob-f9ddf3fcd9570a57df4c565f840bcfc845c2a6d0%2Fazure_auth_secret.png?alt=media" alt=""><figcaption></figcaption></figure>

With these values, we can now complete the provider configuration in the Keycloak console.

## Create the Identity provider

Access the *Identity providers* section for the "akamas" realm in the Keycloak administration console, as described on the page [Configure an external identity provider](https://docs.akamas.io/akamas-docs/3.5.0/managing-akamas/users-management/configure-an-external-identity-provider), and select "OpenID Connect v1.0" to start creating the new provider.

Here, specify an *alias* for the client ("microsoft" in our case) and optionally the *display name* used in the login page ("Microsoft").

In the "OpenID Connect settings" section, configure the following fields using the values from the *app registration* in the Azure portal:

* "Discovery endpoint": populate with the URL of the "OpenID Connect metadata document". This box should become green upon successful validation.
* "Client ID": populate with the "Application (client) ID" from the app's overview page
* "Client Secret": populate with the value of the generated secret

<figure><img src="https://3774185011-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FJSNpKvJ3IYa5Vo69I0ed%2Fuploads%2Fgit-blob-60eaf7c414f3eeb3c7fde630b2d47041749fb945%2Fkc_ms_provider.png?alt=media" alt=""><figcaption></figcaption></figure>

Complete the configuration by clicking "Add". You will land on the detail page of the new provider: here, copy the value of the *redirect URI.*

## Complete the app registration

Back to the *app registration* in the Azure portal, navigate to the "Authentication" section. Add the "Web" platform (if not already present).

<figure><img src="https://3774185011-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FJSNpKvJ3IYa5Vo69I0ed%2Fuploads%2Fgit-blob-45f5a360a55b84084e9868d876b8da022ef43ea8%2Fazure-web.jpg?alt=media" alt=""><figcaption></figcaption></figure>

Finally, add to the list of *redirect URIs* the one from the previous step.

<figure><img src="https://3774185011-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FJSNpKvJ3IYa5Vo69I0ed%2Fuploads%2Fgit-blob-a993e5be236798a017e6e95861882b87d84eab4b%2Fazure_redirect.png?alt=media" alt=""><figcaption></figcaption></figure>

You have now configured Akamas to delegate to Azure your users' login.

{% hint style="warning" %}
When changing the hostname of the Akamas installation, you need to update the *redirect URI* configured in the *app registration*. Skipping this step will block any login attempt with the following error:

> The redirect URI 'https\://...' specified in the request does not match the redirect URIS configured for the application '...'.
> {% endhint %}

## Configure the default Akamas roles

The final setup step is to instruct Akamas to associate the default roles with the users automatically. This way, users will be added to the default workspace with read and write permissions the first time they log in.

On the Keycloak console, on the provider's details page, navigate to "Mappers":

<figure><img src="https://3774185011-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FJSNpKvJ3IYa5Vo69I0ed%2Fuploads%2Fgit-blob-c7b5ff9b978786f8e9091e63e2a95f69b6830a2b%2Fkeycloak-mappers.jpg?alt=media" alt=""><figcaption></figcaption></figure>

Now, add the following configurations.

**User role**

* Name: *User role*
* Mapper type: *Hardcoded role*
* Role: *USER*

<figure><img src="https://3774185011-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FJSNpKvJ3IYa5Vo69I0ed%2Fuploads%2Fgit-blob-86daab00d138ae282d7aec193b7402d0c6b3b33d%2Fkc_user_mapper.png?alt=media" alt=""><figcaption><p>User Role map</p></figcaption></figure>

**Default Workspace Read**

* Name: *Default Workspace Read*
* Mapper type: *Hardcoded role*
* Role: *WS\_ac8481d3-d031-4b6a-8ae9-c7b366f027e8\_R*

**Default Workspace Write**

* Name: *Default Workspace Write*
* Mapper type: *Hardcoded role*
* Role: *WS\_ac8481d3-d031-4b6a-8ae9-c7b366f027e8\_W*

## Test the integration

Visit the installation's login page to check that the new authentication method is displayed and works correctly.

<figure><img src="https://3774185011-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FJSNpKvJ3IYa5Vo69I0ed%2Fuploads%2Fgit-blob-cbe5e150bf07836f9f211465071a77ae06fe99a5%2Fms_auth_login.png?alt=media" alt=""><figcaption></figcaption></figure>
