Creating an OpenID client with Microsoft Azure AD

Modified on Mon, 22 Jan at 5:12 PM

Thanks to this article, you will learn how to create an OpenID client with Microsoft Azure AD to integrate your SSO in the Portal.

SUMMARY


Implementation


Step 1 : Access the creation menu for OpenID client

  • In the Azure AD administration panel, select the App registrations menu
  • Click on New registration

Step 2 : Configure the basic parameters


Step 3 : Retrieve the client ID and the metadata URL from the server

  • Note the Client ID that is referenced Application (client) ID
  • Click the Endpoints button and note the URL for OpenID Connect metadata document. These informations will need to be provided to our teams.

Step 4 : Configure the disconnect

  • Click on the following link next to Redirect URIs



This URL will be used during the user logout process.



Step 5 :
Create the client secret

  • In the Microsoft menu, navigate to Certificates & secrets
  • Click on New client secret

  • (Optionnal) Add an description
  • Choose an expiration date that matches your company's policy
  • Click on Add

  • Note the customer secret corresponding to the Value column (not Secret ID). This value has to be provided to our teams.


Warning: When the secret expires, the authentication in the XMCO Portal will no longer be functional. It will be necessary to communicate us a new secret.



Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article