Active Directory
To configure Appsmith to use Azure Active Directory (Azure AD) as an OIDC provider, follow the steps below:
Prerequisites
- A self-hosted Appsmith instance. See the installation guides for installing Appsmith.
- Before setting up Single Sign-On (SSO), ensure that you have already configured a custom domain for your instance.
- In Appsmith, go to Admin Settings > Authentication and click Enable on OIDC.
- Copy the Redirect URL from the OIDC configuration page to add it when creating the application in Active Directory.
Create application on Active Directory
Log in to your Azure account and under Azure Services, click Azure Active Directory.
Go to Manage Tenants from the navigation bar, select your directory and click Switch.
On your directory's homepage, click + Add > App Registration from the navigation bar.
On the Register an application page:
a. Add a name for your app.
b. Select Accounts in this organizational directory only (user-education only - Single tenant) from the options in Supported account types.
c. In Redirect URI, select the platform as Web, and add the Redirect URL copied from Appsmith's OIDC configurations in the adjacent input field.
d. Click Register.
On the application homepage, copy the Application (client) ID to add it later in the OIDC configurations in Appsmith.
To get the Client secret:
a. On the application homepage, click Add a certificate or secret from the Client credentials label.
b. On the Certificates & secrets page, go to the client secrets tab and click New client secret.
c. On Add a client secret panel, add the description and define the expiration of the key. Click Add.
d. Copy the Value of the Client secret to add it later in the OIDC configurations in Appsmith.
Go back to the application homepage, and click the Endpoints tab from the navigation bar.
In the Endpoints panel, copy and open the OpenID Connect metadata document URL in a new browser tab, and copy the following URLs from that page:
authorization_endpoint
token_endpoint
userinfo_endpoint
jwks_uri
Configure scopes on Active Directory
To configure scopes on Active Directory, go to API permissions from the sidebar and click Add Permission.
On the Request API permissions panel, select Microsoft Graph > Delegated permissions.
In the Select permissions section, select the following permissions from the Openid permissions dropdown:
email
openid
Profile
Scroll down to the Users dropdown and select Users.Read. Click Add permissions.
Go back to the API permissions page and click Grant admin consent for this directory.
Register Active Directory in Appsmith
To complete the OIDC configuration, you have to register the identity provider on Appsmith. Go to Admin Settings > Authentication > OIDC, and follow the steps below:
Add the Application (client) ID copied from the Active Directory application in the Client ID field.
Add the Value of the Client secret copied from the Active Directory application in the Client Secret field.
Add the URLs copied from the OpenID Connect metadata document page into OIDC configurations in Appsmith as per the table below:
OIDC configuration field Azure Active Directory URL Authorization URL authorization_endpoint Token URL token_endpoint User Info URL userinfo_endpoint JWK Set URL jwks_uri
In the Scopes section, add the attributes that allow you to authorize access to user details after a user is successfully authenticated. By default, there are three scopes -
openid
,email
,profile
. Appsmith needsopenid
andemail
as mandatory scopes. To add more scopes, configure them on Active Directory and then add them to the OIDC configurations in Appsmith.In the Username Attribute box, specify the name of the claim which represents the email of the user. The default value is
email
.
Once you have added the details, click the SAVE & RESTART button to save the configuration and restart the instance.
After the Appsmith instance restarts, try logging in again to your account. You'll see a login screen with the SIGN IN WITH OIDC SSO button.