0
Fork 0
mirror of https://github.com/logto-io/logto.git synced 2024-12-16 20:26:19 -05:00
logto/packages/connector-azuread
2022-09-01 17:03:49 +08:00
..
docs feat(connector): azure active directory connector added (#1662) 2022-07-26 23:31:25 +08:00
src chore: upgrade silverhand packages (#1854) 2022-09-01 17:03:49 +08:00
CHANGELOG.md release: v1.0.0-beta.8 2022-09-01 06:11:38 +00:00
jest.config.ts refactor: simplify jest.config.ts (#1741) 2022-08-05 18:43:32 +08:00
logo.svg feat(connector): azure active directory connector added (#1662) 2022-07-26 23:31:25 +08:00
package.json chore: upgrade silverhand packages (#1854) 2022-09-01 17:03:49 +08:00
README.md feat(connector): azure active directory connector added (#1662) 2022-07-26 23:31:25 +08:00
tsconfig.base.json feat(connector): azure active directory connector added (#1662) 2022-07-26 23:31:25 +08:00
tsconfig.build.json feat(connector): azure active directory connector added (#1662) 2022-07-26 23:31:25 +08:00
tsconfig.json feat(connector): azure active directory connector added (#1662) 2022-07-26 23:31:25 +08:00
tsconfig.test.json feat(connector): azure active directory connector added (#1662) 2022-07-26 23:31:25 +08:00

Azure AD connector

The Azure AD connector provides a succinct way for your application to use Azures OAuth 2.0 authentication system.

Table of contents

Set up Azure AD in the Azure Portal

  • Visit the Azure Portal and sign in with your Azure account. You need to have an active subscription to access Azure AD.
  • Click the Azure Active Directory from the services they offer, and click the App Registrations from the left menu.
  • Click New Registration at the top and enter a description, select your access type and add your Redirect URI, which redirect the user to the application after logging in. In our case, this will be ${your_logto_origin}/callback/azuread-universal. e.g. https://logto.dev/callback/azuread-universal. You need to select Web as Platform.
  • If you select Single Tenant for access type then you need to enter TenantID, else you need to enter common as Tenant ID.

Configure your client secret

  • In your newly created project, click the Certificates & Secrets to get a client secret, and click the New client secret from the top.
  • Enter a description and an expiration.
  • This will only show your client secret once. Save the value to a secure location.

Compose the connector JSON

  • Add your App Registration's Client ID into logto json.
  • Add your Client Secret into logto json.
  • Add your App Registration's Tenant ID into logto json.
  • Add your Microsoft Login Url into logto json. This defaults to "https://login.microsoftonline.com/" for many applications, but you can set your custom domain if you have one. (Don't forget the trailing slash)
{
  "clientId": "<client-id>",
  "clientSecret": "<client-secret>",
  "tenantId": "<tenant-id>", // use "common" if you did't select **Single Tenant**
  "cloudInstance": "https://login.microsoftonline.com/"
}

Config types

Name Type
clientId string
clientSecret string
tenantId string
cloudInstance string

References