Entra Authentication

Microsoft Entra authentication enables the DW application to be connected with the Microsoft Entra ID app. Users configured in the Microsoft Entra ID app can then be used to access the DW application.

Microsoft Entra authentication supports two standard protocols: OpenID Connect and SAML (Security Assertion Markup Language).

OpenID Connect is the recommended and more modern approach, providing simpler configuration and better compatibility with modern applications.
SAML is supported for compatibility with existing enterprise environments where SAML-based single sign-on is already in use.

OpenID Connect

Create app registration

  1. Go to Microsoft Entra ID -> App registrations -> New registration

    Figure 1: App registration

    ../_images/entra-1.png

    Figure 2: App registration 2

    ../_images/entra-1a.png
  2. Fill the name of the application, select “Accounts in this organizational directory only (Single tenant)” and click “Register”.

    Figure 3: App registration 3

    ../_images/entra-2.png

Set permissions

  1. Open the app registration and go to API permissions

    Figure 4: Set permission

    ../_images/entra-3.png
  2. Remove “User.Read” permission by clicking the three dots on the right side and select “Remove permission”

    Figure 5: Set permission 2

    ../_images/entra-4.png
  3. Click “Add permission”

    Figure 6: Set permission 3

    ../_images/entra-5.png
  4. Add a permission -> Microsoft Graph -> Application permissions -> User.ReadBasic.All

    With the User.ReadBasic.All permission, you can access basic user profile information. However, if you want to access user Office Location, use “User.Read.All” permission instead. With “User.Read.All” permission, you can also search for users by typing their office location in the search box in the import users dialog.

    Figure 7: Set permission 4

    ../_images/entra-6.png
  5. Add following permissions -> Microsoft Graph -> Delegated permissions -> openid, profile and email

    Figure 8: Set permission 5

    ../_images/entra-7.png
  6. Grant admin consent

    Figure 9: Set permission 6

    ../_images/entra-8.png

Create client secret

  1. Open the app registration and go to Certificates & secrets

    Figure 10: Create client secret

    ../_images/entra-9.png
  2. Create new client secret

    Figure 11: Create client secret 2

    ../_images/entra-10.png
  3. Copy and save the secret value

    Figure 12: Create client secret 3

    ../_images/entra-11.png

Add redirect URI

  1. Open the app registration and go to Authentication

    Figure 13: Add redirect URI

    ../_images/entra-12.png
  2. Platform configurations -> Add a platform -> Web

    Figure 14: Add redirect URI 2

    ../_images/entra-13.png
  3. Add Web redirect URI for tenant in following format https://{tenant ID}.2ring.cloud/realms/{tenant ID}/broker/entra_id/endpoint

    Figure 15: Add redirect URI 3

    ../_images/entra-14.png
  4. Contact 2Ring support and provide tenant id, client id and configured client secret.

SAML

Configure Microsoft Entra ID (Azure Portal)

Step 1: Create an Enterprise Application

  1. Log in to the Azure Portal

  2. Navigate to Microsoft Entra ID (or Azure Active Directory)

    Figure 16: Create an Enterprise Application

    ../_images/entra-15.png
  3. Click on Enterprise applications in the left menu

    Figure 17: Create an Enterprise Application 2

    ../_images/entra-16.png
  4. Click New application

    Figure 18: Create an Enterprise Application 3

    ../_images/entra-17.png
  5. Click Create your own application

    Figure 19: Create an Enterprise Application 4

    ../_images/entra-18.png
  6. Enter a Name (e.g., “Keycloak SAML SSO”), select Integrate any other application you don’t find in the gallery (Non-gallery) and click Create

    Figure 20: Create an Enterprise Application 5

    ../_images/entra-19.png

Step 2: Configure SAML Single Sign-On

  1. In your new Enterprise Application, go to Single sign-on from the left menu

    Figure 21: Configure SAML Single Sign-On 1

    ../_images/entra-20.png
  2. Select SAML as the single sign-on method

    Figure 22: Configure SAML Single Sign-On 2

    ../_images/entra-21.png
  3. Click Edit on section 1. Basic SAML Configuration

    Figure 23: Configure SAML Single Sign-On 3

    ../_images/entra-22.png
Configure Basic SAML Settings:
  • Identifier (Entity ID):

    Click on Add indentifier and enter the following URL as the Entity ID:

    https://{tenant_name}.2ring.cloud/realms/{tenant-name}
    

    Replace {tenant-name} with your actual tenant name

  • Reply URL (Assertion Consumer Service URL):

    Click on Add reply URL and enter the following URL as the Reply URL:

    https://{tenant_name}.2ring.cloud/realms/{tenant-name}/broker/entra-saml/endpoint
    

    Replace {tenant-name} with your actual tenant name and entra-saml with your IdP alias in Keycloak

  • Sign on URL (Optional):

    https://{tenant_name}.2ring.cloud/realms/{tenant-name}/protocol/saml
    
  1. Click Save

    Figure 24: Configure Basic SAML Settings

    ../_images/entra-23.png

Step 3: Configure User Attributes & Claims

  1. Click Edit on section 2. Attributes & Claims

    Figure 25: Configure User Attributes & Claims

    ../_images/entra-24.png
  2. Ensure the following claims are present (add if missing):

    Claim Name

    Source Attribute

    name

    user.userprincipalname

    emailaddress

    user.mail

    givenname

    user.givenname

    surname

    user.surname

    Figure 26: Configure User Attributes & Claims 2

    ../_images/entra-25.png

Set permissions

  1. Navigate to Microsoft Entra ID -> App registrations -> open the app registration and go to API permissions

    Figure 27: Set permission

    ../_images/entra-3.png
  2. Remove “User.Read” permission by clicking the three dots on the right side and select “Remove permission”

    Figure 28: Set permission 2

    ../_images/entra-4.png
  3. Click “Add permission”

    Figure 29: Set permission 3

    ../_images/entra-5.png
  4. Add a permission -> Microsoft Graph -> Application permissions -> User.ReadBasic.All

    With the User.ReadBasic.All permission, you can access basic user profile information. However, if you want to access user Office Location, use “User.Read.All” permission instead. With “User.Read.All” permission, you can also search for users by typing their office location in the search box in the import users dialog.

    Figure 30: Set permission 4

    ../_images/entra-6.png
  5. Grant admin consent

    Figure 31: Set permission 6

    ../_images/entra-8a.png

Create client secret

  1. Open the app registration and go to Certificates & secrets

    Figure 32: Create client secret

    ../_images/entra-9.png
  2. Create new client secret

    Figure 33: Create client secret 2

    ../_images/entra-10.png
  3. Copy and save the secret value

    Figure 34: Create client secret 3

    ../_images/entra-11.png

Provide configuration details to 2Ring

After completing the configuration, provide the following information to 2Ring support:

  • Entra ID (Tenant ID)

  • Application (Client) ID

  • Client Secret

These details are required to complete the integration between Microsoft Entra ID and the DW application.