mirror of
https://github.com/logto-io/logto.git
synced 2024-12-23 20:33:16 -05:00
8db355287c
* feat(core,connector-core): add connector core (#1803) * feat(core,connector-core): add connector core * fix: create connector function * refactor(connector): change connectors dependency from connector-types to connector-core (#1812) * refactor(connector,core): change the connectors dependency from connector-types to connector-core * refactor(core): do not need to test validator for specific connector implementation * refactor(connector): remove unnecessary code snippets * refactor(connector): keep UT placeholder for passwordless connectors Co-authored-by: wangsijie <wangsijie@silverhand.io> * fix(core): fix IT description and undestructure error (#1818) fix(connector): fix connector routes and IT typos * fix(connector): remove @logto/connector-types as it will not be used anymore (#1819) fix(connector): remove @logto/connector-types as it will not be used anymore * chore(connector): rename db in logto connector (#1821) chore(connector): rename LogtoConnector db to dbEntry Co-authored-by: Darcy Ye <darcyye@silverhand.io> |
||
---|---|---|
.. | ||
docs | ||
src | ||
CHANGELOG.md | ||
jest.config.ts | ||
logo.svg | ||
package.json | ||
README.md | ||
tsconfig.base.json | ||
tsconfig.build.json | ||
tsconfig.json | ||
tsconfig.test.json |
Azure AD connector
The Azure AD connector provides a succinct way for your application to use Azure’s OAuth 2.0 authentication system.
Table of contents
Set up Azure AD in the Azure Portal
- Visit the Azure Portal and sign in with your Azure account. You need to have an active subscription to access Azure AD.
- Click the Azure Active Directory from the services they offer, and click the App Registrations from the left menu.
- Click New Registration at the top and enter a description, select your access type and add your Redirect URI, which redirect the user to the application after logging in. In our case, this will be
${your_logto_origin}/callback/azuread-universal
. e.g.https://logto.dev/callback/azuread-universal
. You need to select Web as Platform. - If you select Single Tenant for access type then you need to enter TenantID, else you need to enter
common
as Tenant ID.
Configure your client secret
- In your newly created project, click the Certificates & Secrets to get a client secret, and click the New client secret from the top.
- Enter a description and an expiration.
- This will only show your client secret once. Save the value to a secure location.
Compose the connector JSON
- Add your App Registration's Client ID into logto json.
- Add your Client Secret into logto json.
- Add your App Registration's Tenant ID into logto json.
- Add your Microsoft Login Url into logto json. This defaults to "https://login.microsoftonline.com/" for many applications, but you can set your custom domain if you have one. (Don't forget the trailing slash)
{
"clientId": "<client-id>",
"clientSecret": "<client-secret>",
"tenantId": "<tenant-id>", // use "common" if you did't select **Single Tenant**
"cloudInstance": "https://login.microsoftonline.com/"
}
Config types
Name | Type |
---|---|
clientId | string |
clientSecret | string |
tenantId | string |
cloudInstance | string |