0
Fork 0
mirror of https://github.com/logto-io/logto.git synced 2024-12-23 20:33:16 -05:00
logto/packages/connector-azuread
2022-08-22 14:58:39 +08:00
..
docs feat(connector): azure active directory connector added (#1662) 2022-07-26 23:31:25 +08:00
src chore(phrases): add translation ko_KR (#1677) 2022-07-30 14:48:50 +00:00
CHANGELOG.md release: v1.0.0-beta.5 2022-08-19 13:49:33 +00:00
jest.config.ts refactor: simplify jest.config.ts (#1741) 2022-08-05 18:43:32 +08:00
logo.svg feat(connector): azure active directory connector added (#1662) 2022-07-26 23:31:25 +08:00
package.json refactor: watch all packages when dev (#1796) 2022-08-22 14:58:39 +08:00
README.md feat(connector): azure active directory connector added (#1662) 2022-07-26 23:31:25 +08:00
tsconfig.base.json feat(connector): azure active directory connector added (#1662) 2022-07-26 23:31:25 +08:00
tsconfig.build.json feat(connector): azure active directory connector added (#1662) 2022-07-26 23:31:25 +08:00
tsconfig.json feat(connector): azure active directory connector added (#1662) 2022-07-26 23:31:25 +08:00
tsconfig.test.json feat(connector): azure active directory connector added (#1662) 2022-07-26 23:31:25 +08:00

Azure AD connector

The Azure AD connector provides a succinct way for your application to use Azures OAuth 2.0 authentication system.

Table of contents

Set up Azure AD in the Azure Portal

  • Visit the Azure Portal and sign in with your Azure account. You need to have an active subscription to access Azure AD.
  • Click the Azure Active Directory from the services they offer, and click the App Registrations from the left menu.
  • Click New Registration at the top and enter a description, select your access type and add your Redirect URI, which redirect the user to the application after logging in. In our case, this will be ${your_logto_origin}/callback/azuread-universal. e.g. https://logto.dev/callback/azuread-universal. You need to select Web as Platform.
  • If you select Single Tenant for access type then you need to enter TenantID, else you need to enter common as Tenant ID.

Configure your client secret

  • In your newly created project, click the Certificates & Secrets to get a client secret, and click the New client secret from the top.
  • Enter a description and an expiration.
  • This will only show your client secret once. Save the value to a secure location.

Compose the connector JSON

  • Add your App Registration's Client ID into logto json.
  • Add your Client Secret into logto json.
  • Add your App Registration's Tenant ID into logto json.
  • Add your Microsoft Login Url into logto json. This defaults to "https://login.microsoftonline.com/" for many applications, but you can set your custom domain if you have one. (Don't forget the trailing slash)
{
  "clientId": "<client-id>",
  "clientSecret": "<client-secret>",
  "tenantId": "<tenant-id>", // use "common" if you did't select **Single Tenant**
  "cloudInstance": "https://login.microsoftonline.com/"
}

Config types

Name Type
clientId string
clientSecret string
tenantId string
cloudInstance string

References