Page tree
Skip to end of metadata
Go to start of metadata

 It is possible to setup Azure Active Directory together with the piplanning app as an OpenID provider. With this setup in place, your existing Azure AD users will be able to login to the piplanning app without the need for a different account.

The generic instructions are also available on the Microsoft Docs website


Setting up Azure AD

  1. Go to the Azure portal: https://portal.azure.com/#home
  2. Select Azure Active Directory in the menu
  3. Go to App registrations and click on New registration
  4. Insert the name of the application (e.g. piplanning app) and the callback URL.

    Please note: Depending on how your AD is configured and which users you want to give access to the piplanning app, you might have to select a different option in the Supported account types section. If login for some users doesn't work, try changing this configuration option.


    The callback URL can be found on the "Identity Provider" page in the Cockpit.
  5. Next is the creation of a client secret. This can be done by going in the "Certificates & Secrets" menu item and clicking on "New client secret"
  6. The secret can now be copied and saved. This information is needed in the piplanning app to setup the Identity Provider



Setting up the piplanning app

  1. Login to the Cockpit and click on the "Idenity Provider" menu item. The OpenID Connect configuration page will open.
  2. Fill in a connection name of your choice. This name will appear on the login button for your users. (e.g. "Azure AD")
  3. Leave the "Automatically discover endpoints" option enable and enter as Issuer the following URL: https://login.microsoftonline.com/{tenantId}
    The tenant ID must be substituted with the value found on the Azure AD application registration overview as Directory (tenant) ID:


    Please note: Depending on your configuration, you might have to user the version 2.0 of the API. If login doesn't work with your setup, try to append /v2.0 to the issuer URL:
    https://login.microsoftonline.com/{tenantId}/v2.0
  4. Fill in the client ID that you can also find in the application registration overview as Application (client) ID
  5. Fill in the client secret from the value you previously generated under "Certificates & Secrets"
  6. At this point the form should be complete and by clicking "Save" the connection should now be saved.

The login screen will now add the option of logging in with Azure AD

  • No labels