Browse Source

docs: azure AD entra

pull/7575/head
Raju Udava 11 months ago
parent
commit
9877264298
  1. 37
      packages/noco-docs/docs/140.account-settings/040.authentication/030.SAML-SSO/040.azure-ad.md

37
packages/noco-docs/docs/140.account-settings/040.authentication/030.SAML-SSO/040.azure-ad.md

@ -20,31 +20,30 @@ This article briefs about the steps to configure Active Directory as Identity se
### Azure AD, Configure NocoDB as an Application ### Azure AD, Configure NocoDB as an Application
1. Sign in to your [Azure account](https://portal.azure.com/#allservices) and navigate to `Azure Active Directory` under `Azure Services`. 1. Sign in to your [Azure account](https://portal.azure.com/#allservices) and navigate to `Microsoft Entra admin center` > `Identity` > `Enterprise applications`
2. Access `Manage Tenants` from the navigation bar, select your directory, and click `Switch`. 2. Click `+ New application`
3. On your directory's homepage, click `+ Add` > `Enterprise Application` from the navigation bar. 3. On the `Browse Microsoft Entra Gallery` page, select `Create your own application` from the navigation bar.
4. On the `Browse AD Azure Gallery` page, select `Create your own application` from the navigation bar.
a. Provide your application's name. a. Provide your application's name.
b. Choose `Integrate any other application you don't find in the gallery (Non-gallery)` from the `What are you looking to do with your application?` options. b. Choose `Integrate any other application you don't find in the gallery (Non-gallery)`
c. `Create` c. `Create`
5. In your Application's Overview page, navigate to `Set up single sign-on` > `SAML` 4. On your application page, navigate to `Manage` > `Single sign-on` > `SAML`
6. In the SAML-based Sign-on page, go to the `Basic SAML Configuration` section under `Set up Single Sign-On with SAML` and click `Edit` 5. Go to the `Basic SAML Configuration` section under `Set up Single Sign-On with SAML` and click `Edit`
a. Add the `Audience URI` under `Identifier (Entity ID)`. a. Add the `Audience URI` under `Identifier (Entity ID)`.
b. Add the `Redirect URL` under `Replay URL (Assertion Consumer Service URL)`. b. Add the `Redirect URL` under `Replay URL (Assertion Consumer Service URL)`.
c. `Save` c. Click `Save`
7. In the `Attributes & Claims` section, click `Edit` 6. In the `Attributes & Claims` section, click `Edit`
a. Edit the Unique User Identifier (Name ID) claim: a. Edit the "Unique User Identifier (Name ID)" claim:
- Select `Email address` from the `Name identifier format` dropdown - Select `Email address` from the `Name identifier format` dropdown
- Choose `Attribute` as the `Source` - Choose `Attribute` as the `Source`
- In the `Source attribute field`, select the option storing the user’s email address. - In the `Source attribute`, select `user.mail`
- `Save` - Click `Save`
b. (Optional) For custom claims: [//]: # ( b. (Optional) For custom claims:)
- Click Add new claim, provide details, and save. [//]: # ( - Click Add new claim, provide details, and save.)
- Ensure the claim is visible in the Additional claims section. [//]: # ( - Ensure the claim is visible in the Additional claims section.)
- Copy the claim name for later use in NocoDB SAML configurations. [//]: # ( - Copy the claim name for later use in NocoDB SAML configurations.)
8. Go to the `SAML Certificates` section and copy the `App Federation Metadata URL` 7. Go to the `SAML Certificates` section and copy the `App Federation Metadata URL`
9. on the Application's Overview page, 8. on the Application's Overview page,
- Click `Assign users and groups`, - Click `Users and groups`,
- Add the necessary users or groups to the application. - Add the necessary users or groups to the application.

Loading…
Cancel
Save