Dashboard SSO

Supported protocols: Saml, OpenId, SCIM and OAuth

OpenId example with Microsoft Entra ID

In your Azure Portal, go to Microsoft Entra ID, then create a new App registration by clicking on "New registration".

Give the app registration a name and choose "Public client/native (mobile & desktop)" and enter the callback url https://<fidentitytenantname>.fidentity.ch/api/v1/openid-login/callback the other settings can be left as default. Note that this also works if you have a custom fidentity domain (see Custom Domain).

Click Save.

Copy the tenant ID on the overview page and paste it in the url below. The OpenId Connect configuration can now be downloaded from this url:

https://login.microsoftonline.com/<tenantId>/.well-known/openid-configuration

Please send us the configuration (json).

Application Roles

It is possible to assign app roles to an enterprise application. Click "Create App Role", add a custom name, value and description.

The value is sent as roles claim (no additional token configuration necessary), please provide us with your roles values so that we can configure the mapping to fidentity roles.

Assign Roles

Roles are assigned to users or groups in the enterprise application as follows:

Testing

When changing configuration in Entra ID, it is important to start a completely new SSO login, preferrably using a private browser window, so that all current claims are set accordingly.

Last updated