Skip to main content
Version: v10.15

SSO Azure Active Directory Open ID Integration


There are many ways to enable security for your app in WaveMaker. You can use Azure Active Directory (Azure AD) which is a Microsoft cloud-based identity and access management service. This document helps you to enable SSO services using Azure AD with Open ID integration. Follow the steps below to configure it.

Registering your application in Azure AD

  • Go to App Registrations.

searching service azure

  • Click New registration.

new registration

register

redirect url

Registering the Application

  • Name: Enter the application name.
  • Supported account types: Select the type of account to give permissions on the application.
  • Redirect URL: Provide a redirection URL (optional).

Application Settings

  • Go to Enterprise applications.

enterprise apps

  • Select the application which you created.

select created app

  • Select the Assign users and groups option.

Click assign users and groups

  • Click Add User to add the domain users to give permissions.

Note these details

You'll need the following details for enabling security for WaveMaker application.

azure provider details

Client ID

  • Go to App Registrations.
  • Click on the app to access all necessary authorization details.
  • Note the Application (client) ID for the app that you created.

Endpoints

  • In the App Overview page, select the Endpoints option.
  • Go to the OpenID Connect metadata document.
  • Copy and paste the URL in a browser; it will display data in JSON format with OpenID connection URLs. This information will be used in OpenID Configuration Setup in WaveMaker.

Certificates and Secrets

You can upload certificates and related information in the Manage section of app settings under the Certificates & Secrets option.

  • Click New client secret, and select the Duration; for example, Expires in 1 year. Note the generated secret value.(see here for details)

Open ID Configuration Setup in WaveMaker

  • Open a WaveMaker project.
  • Go to the Security settings of the project.

select security

  • Go to the Authentication and Authorization tab.

authentication-authorization

  • In the Authentication section, go to Security Providers, and select Open ID from the dropdown.
  • Enter the Provider details in the following section.

1. Identity Provider Information

You'll need the the Endpoints from OpenID Connect metadata document.

enter the provider details

  • ProviderID: Select the Custom option and Enter the Provider Name. For example, azure.
  • Authorization Url: Enter the authorization_endpoint URL specified from the metadata document.
  • Token Url: Enter the token_endpoint URL from the metadata document.
  • JWKS Url: Enter the jwks_uri from the metadata document.
  • User Info Endpoint: Enter the userinfo_endpoint URL from the metadata document.
  • Logout Url: Enter the end_session_endpoint URL from the metadata document.

2. Service Provider Information

  • Redirect Url: Go to the app overview page in Azure AD, and enter this URL in the Redirect URLs section.

3. Integration Information

service provider and integration

4. Role Mapping

You can assign the roles to the logged-in user by selecting OpenID, or Database. If you select the provider as a Database, the configuration is similar to the WaveMaker standards. You just have to keep in mind that the user against whom the roles will be linked is the one returned by the Active Directory query.

For more information about role mapping, see Role Mapping in OpenID

See Also

Aunthentication in WaveMaker
Quickstart: Add sign-in with Microsoft to a Java web app
Authorize access to web applications using OpenID Connect and Azure Active Directory