Set Up Azure AD Single Sign On (SSO)

This article walks through the steps required to use Azure Active Directory as your Single Sign On (SSO) authentication method in Cloud Control Center.

Create a New App Registration in Azure

Retrieve Issuer URL

Create a Client Secret

Configure Optional Claims in Token Configuration

Configuring Redirect URIs

Verify Manifest Configuration

Configure API Settings

Create an App Role

Create User Groups in Your Directory

Register Azure AD SSO in Cloud Control Center

Create a New App Registration in Azure

Go to your Azure Active Directory Portal, and click on App Integrations on the left side menu. Click "New Registration"

Create app regisatration

 

Give your application a name, select "Accounts in this organizational directory only," and click "Register."

app-registration-details

 

Copy the Application (Client) ID of your newly created App into a note.

copy clientid

Retrieve Issuer URL

In the "Overview" tab select "Endpoints" from the top menu. Copy the URL labeled "OpenID Connect metadata document" and paste in a new tab.

copy into new tab

 

Copy the issuer link into a note, it should look like this: https://login.microsoftonline.com/XX...XX/v2.0

find issuer URL

Create a Client Secret


From the "Overview" tab on your new Application, select "Add a Certificate or Secret"

overview-add a secret

 

Select "New Client Secret"

Enter suitable description, and choose when the secret will expire. We will choose 24 months, but longer expiration periods can be created if you set a custom range. Remember to create new secret after client secret expires and change the secret in CCC as well. Click Add.

Create a secret

 

Be sure to copy your client secret and paste into your note. It only appears once, and will be hidden if you do not copy it before leaving this page. 

Preview-secret

 

You should now have these three items copied into your notepad. You will need to enter these values into Cloud Control Center later.

ccc-sso-creds

Configure Optional Claims in Token Configuration

  1. Select "Token Configuration" in the left menu and click "Add Optional Claim."
  2. Select "Token Type = ID" and select the three following options: given_name, family_name, email
  3. Confirm your selections and click "Add"

select token options


You will get a warning that these claims (email, family_name, given_name) require OpenID Connect Scopes to be configured through the API Permissions Page. Don't worry, we will configure this in a later step.

Configuring Redirect URIs

  1. Click on Authentication from the side tab
  2. Select Add a platform, and select the "Web" box.
  3. Enter redirect URI: https://<domain>/api/v1/iam/login/oauth2/code/CR_<client_id>
  4. Replace <domain> with the url of your Cloud Control Center.
  5. Replace <client_id> with the Client ID we copied to our notes in a previous step.
  6. Leave front-channel logout URL empty.
  7. Select Access Token and ID tokens from the check boxes.
Config_Redir_URIs

 

Verify Manifest Configuration

  1. Clink on manifest
  2. Ensure "accessTokenAcceptedVersion" is set to 2; if it is null change it to 2.
  3. Click save after changing the value.

manifest

Configure API Settings

  1. Select expose an API on the left panel. 
  2. Next to Application ID URI, click set.
  3. Change the field to "api://elisity.ccc" and click save.

set_App_ID_URI


  1. Next, click on "Add a Scope"
  2. Fill out the following fields:
    1. Scope Name: Employees.Read.All
    2. Who Can Consent?: Admins and Users
    3. Admin consent display name: Read-only access to Employee records
    4. Admin consent description: Allow the application to have read-only access to all Employee data
    5. (Optional) User consent display name: Read-only access to your Employee records
    6. (Optional) User consent description: Allow the application to have read-only access to your Employee data
  3. Click Add scope
AddaScope

 

Next, Click on API permissions on the side panel. Click "add a permission" and click "My APIs." You then need to click on your application name.

request_api_permissions

 

Select Employees.Read.All and click "Add permissions"

add_permissions

 

Again, click on "Add a permission" and this time click on Microsoft Graph.

select_graph


 

Click on Delegated Permissions, and under OpenID permissions select the following: email, offline_access, openid, profile. Click "Add Permissions" after confirming selection.

select_permissions

Create an App Role

Here we will create user roles that will grant different permissions to users who log into Cloud Control Center based on their user group. We will create TWO App Roles: TenantAdmin and TenantUser.

For TenantAdmin:

  • Display name: TenantAdmin
  • Allowed member types: Users/Groups
  • Value: TenantAdmin (be sure this is typed correctly)
  • Description: Read/Write Privileges for Tenant Admins
  • Do you want to enable this app role? *Checked

Apply, and create another App Role for TenantUsers.

 

create-tenant-admin-role

create-tenant-user-role

 

Create User Groups in Your Directory


Next we need to create the user groups that will give users permissions to log in to Cloud Control Center via Azure SSO.

Click on Azure Active Directory -> Groups -> New Group

Create New Group

Create Security Groups for each Application Role we created (TenantAdmin, TenantUser)

Example:

Group type: Security

Group name: TenantAdmin

Group description: Elisity CCC Tenant Admin with Read/Write privileges

Membership type: Assigned

Owners: Select an owner for this group; can be person creating the group or managing Azure AD

Members: Select appropriate members (Member assignments/removal can also be done later by viewing the group from the Groups page)

 

NOTE: Every group should have at least 1 owner.

 

Create a group for TenantUsers in the same fashion as above.

Assign user groups to Cloud Control Center Application in Azure

  1. Create_TenantAdmin_groupAssign groups to CCC App
  2. Click on Azure Active Directory -> Enterprise Applications -> Search for CCC in the search box and select the application
  3. Go to the Users and Groups tab -> Assign users and groups


 

  1. Click on Users and Groups and select the appropriate group (TenantAdmins and TenantUsers, or any other group you would like) 
  2. Click on Select a role and select appropriate role (TenantAdmin or TenantUser)
  3. Click Assign

*No screenshots available for this step currently*

Register Azure AD SSO in Cloud Control Center


  • Sign in to Cloud Control Center, and navigate to Administration Settings → SSO Configuration.
  • Select "Azure" and copy the credentials from your notes that we saved in previous steps: Client ID, Client Secret, Issuer

 

After submitting creds

Your credentials will be validating upon clicking submit. If everything is correct, you should see the submit button greyed out, and your SSO. configuration is complete. Now you can log in to Cloud Control Center with any account in AAD that has the correct user group.