Use Microsoft Azure AD as SSO Provider
Important | |
When using SSO, you need to create user accounts in ClickHelp for each SSO user that authenticates with a 3rd-party service. This is required so ClickHelp can apply specific permissions to the authenticated user, and those permissions are configured in a ClickHelp user profile. You can use ClickHelp REST API to bulk-create users or to create a new ClickHelp user every time a new application user is getting created on your end. |
The Azure SSO provider allows users to log into a ClickHelp portal using their Azure Active Directory accounts. It is possible to make the portal a single-tenant application and allow only users from a specific Azure AD to log in to the portal. Alternatively, you can make the portal multi-tenant and work with users from any Azure AD tenants.
Only Azure Active Directory (Work or School) accounts are supported. Microsoft (personal) accounts are not supported.
-
Open the Azure portal, go to Azure Active Directory.
-
Click App registrations.
-
Click the New registration link.
-
On the Register an application screen, specify the application name,
desired access type (single or multi-tenant), application type (select
Web), and the redirect URL (https://<YOU_PORTAL_NAME>.clickhelp.co/oauth2/). Click Register to proceed.
-
The application is added. Now, we need to get some details about it. If the
application widget is not opened automatically, click the application name
on the App Registrations screen.
-
Find the Application (client) ID and
Directory (tenant) ID fields in the application widget. The value of
the first field is the Client ID needed to set up the OpenID Connect
provider in ClickHelp, and the second value is the Tenant ID that we
will need. Copy the values somewhere to use them later.
-
Click Certificates & secrets, then New client secret, and
specify a name for a new client secret. Select the desired duration for the
secret and click Add to generate the value. Copy the generated string
and save it somewhere — this is the new application’s client secret.
Important This is the only time you can see the password in the Azure portal.
-
Now open the Single Sign-on settings page in your ClickHelp portal by
going to Tools → Portal Settings → Administration → Single Sign-on.
- Populate the corresponding fields of the Azure client in ClickHelp with the values from Azure. For example, use either the Tenant ID or the domain name for the Tenant field. If you want to make users from several tenants access your ClickHelp portal, check the Multi-tenant box. Then, enable the connection and save changes.
Now it is possible to log in to the portal using Azure Active Directory accounts. To make the portal log in the user, the email address of the AD account should be the same as the address of the corresponding ClickHelp account.
When logging in to the portal with the Azure AD account for the first time, you will be prompted to accept the ClickHelp portal’s request for permissions to read the Azure AD user profile.