Skip to main content
All CollectionsSetting Up Your WorkspaceAuthentication
Configuring Single-Sign On with Microsoft Azure Active Directory
Configuring Single-Sign On with Microsoft Azure Active Directory

Configure SSO using Microsoft Azure Active Directory

Updated over a month ago

Note: These instructions are applicable only to CalypsoAI On-Premise users.

Configuring Microsoft Azure Application Registration

Step 1: Create an Application Registration for Keycloak

This application will be what Keycloak uses to authenticate your active directory users with your Azure tenant.

Navigate to https://portal.azure.com and select the App registrations option under the Azure services section. (*This could also be the Microsoft 365 Admin Center as well)

  • Note: You will need administrative permissions to create an app registration.

Select the New registration option in the upper left-hand corner.

Provide a name for the application you are registering and select the account type that you would like to be supported (CalypsoAI is a single-tenant). Then select the register button.

Once you have registered your application you will be returned to the Application registration’s overview page. Note your Application (client) ID as you will need it later when creating your identity provider in the Keycloak administration console.

Step 2: Create a Client Secret for your Newly Registered Application

Navigate to the Certificates and secrets section. Create a new client secret and copy the client secret value that was generated as you will need to use this when establishing your identity provider in the Keycloak administration console.

Create Microsoft Identity Provider in Keycloak Administration Console

Step 1: Sign into the Keycloak Administration Console

Once you have the Moderator solution up and running, Keycloak should be as well. Login to the Keycloak admin console at https://hostname/auth where hostname is the name of your Moderator server. Once logged in, click on the “Administration Console” link.

Step 2: Create OpenID Connect v1.0 as an Identity Provider in your Realm

Navigate to the Identity Provider tab and select OpenID Connect v1.0 as your provider from the dropdown list.

Make sure to note the redirect URI for your identity provider as you will need to use it in the following step.

Navigate to the Display Name Field and type in a name for the connection. For Example: “Active Directory” and leave all the other fields in this top section as is.

Navigate to the OpenID Connect Settings section, Click into the Discovery Endpoint field and paste the following url where directoryID is the Directory (tenant) ID for your Azure single-tenant application that you have registered.

You will now add in the client ID and client secret value that you previously saved when registering your application in Microsoft Azure. Once you have entered these values in their respective fields, Click the Add Button.

Once Added the following settings should be automatically populated for the identity provider: Authorization URL, Token URL, Logout URL, User Info URL, Issuer, and JWKS URL.

Using Microsoft Azure Active Directory Credentials for CalypsoAI Authentication

If the provider was configured properly, you should see the Sign In With SSO Identity on the CalypsoAI Login page. You can click this and it will redirect to the provider’s authentication page. Once credentials are entered, you will be redirected back to CalypsoAI.

Once a user logs in for the first time, the user is automatically added to the list of users in KeyCloak. To verify, simply click on Users in the left hand navigation of Keycloak, and you should see that user listed now.

From here, you can add them to any Groups you’ve created inside of CalypsoAI.

Did this answer your question?