Authenticate worker single sign-on (SSO) from Microsoft Azure AD using OpenID Connect
Introduction
This guide demonstrates how to enable one-click single sign-on (SSO) for Cerb workers by authenticating against existing Microsoft Azure AD (Active Directory) accounts using the OpenID Connect (OIDC) standard.
The email address for each account in Azure AD will need to be associated with a worker record in Cerb. You can also disable password-based logins for those accounts.
Configure Azure AD
Log in to the Azure Portal.
Create OAuth app for Cerb
-
Navigate to All services » Azure Active Directory.
-
Select App registrations from the left menu.
-
Click the New registration button at the top.
Name Cerb SSO Supported account types (Default Directory) Redirect URI (Web) https://{CERB-URL}/sso/azure-ad
-
Click the blue Register button at the bottom.
Create client secret
-
In the new app registration, navigate to Certificates & secrets.
-
Click the New client secret button in the Client secrets section near the middle of the page.
Description Cerb SSO Expires Never -
Click the blue Add button.
-
Copy the Value (not the Secret ID).
Configure optional claims
-
In the new app registration, navigate to Token configuration.
-
Click the Add optional claim button.
-
Select ID for Token type.
-
Check the box to the left of the
email
claim. -
Click the blue Add button at the bottom of the claim list.
Configure Cerb
Log in to Cerb as an administrator.
Create a connected service for Azure
-
Navigate to Search » Connected Services and click the (+) icon above the worklist.
Name Azure AD URI azure-ad
Type OpenID Connect Identity Provider Client ID (from Azure app above) Client Secret (from Azure app above) Authorize Scope openid email
Issuer https://login.microsoftonline.com/{DIRECTORY-ID}/v2.0
You can find the
{DIRECTORY-ID}
in the Azure portal for your app registration as Directory (tenant) ID. -
Click the Run Discovery button.
-
Click the Save Changes button.
Configure SSO
-
Navigate to Setup » Security » Authentication.
-
Check Azure AD.
-
Click the Save Changes button.
Log in
-
Visit the login form in Cerb.
-
Click the Azure AD button.
-
Log in using your Microsoft ID.
-
Accept consent.
-
You should be logged into Cerb as the worker associated with your Microsoft email address.