Skip to main content

🔐 SSO Configuration

Ugo Q avatar
Written by Ugo Q
Updated over 3 months ago

Introduction

The SSO protocol used is OpenID Connect (OIDC). OpenID Connect (OIDC) is an identity authentication protocol that is an extension of open authorization (OAuth) 2.0 to standardize the process for authenticating and authorizing users when they sign in to access digital services.

Create App Registration

In order to authenticate users, a new Application Registration is required in the client’s Azure AD.

At creation, accept the default selection of Accounts in this organizational directory only (Default Directory only - Single tenant) for this application. For connection the values of Application (client) ID and Directory (tenant) ID and Client Secret (created below) is needed.

Give the app an easy identifiable name. Accept the default selection of Accounts in this organizational directory only (Default Directory only - Single tenant). Redirect URI may be left empty and completed later, or add the necessary ones from the Set app registration redirect URI step.

Here is the screen with the info of the just created application.

Create new app registration client secrets

It is suggested to create separate client secrets per environment.

Please select the longest period for the expiration.

Set app registration redirect URI

Add web redirect URI for the app in the Authentication settings. Please add the URLs only for necessary environments (usually production, preprod may be added for testing).

Allow ID Tokens

B2C is using ID tokens. Please make sure the ID tokens (used for implicit and hybrid flows) checkbox is checked in the Authentication settings.

Give app permissions

The application requires the following permissions:

  • MS Graph openid: allows user to sign in

  • MS Graph email: allows retrieving the email at sign in

The permissions need the admin consent in order to avoid requesting the permissions from the users.

Info needed by Cimes

Once created, please share the following information to your customer success manager or technical account manager at Cimes.

  • Azure AD Application

    • Application (client) ID

    • Directory (tenant) ID

    • Client secrets

  • Email domains for which the SSO should be activated

    • Ex: all Cimes users use a @groupecimes.com email.

In case there are multiple Azure AD used, please send us which email domain is registered in which Directory (tenant) ID to configure the login.

Did this answer your question?