You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: authentication/AzureAD/README.md
+37-18Lines changed: 37 additions & 18 deletions
Original file line number
Diff line number
Diff line change
@@ -159,7 +159,16 @@ After activating your account by email, you should have access to your Aure AD i
159
159
160
160

161
161
162
-
2. Generate an OpenID client secret.
162
+
2. Retrieve Tenant and Client information.
163
+
164
+
In **Azure Active Directory** / **App Registration**, select **ODM Application** and click **Overview**:
165
+
166
+
* Application (client) ID: **Client ID**. It will be referenced as `CLIENT_ID` in the next steps.
167
+
* Directory (tenant) ID: **Your Tenant ID**. It will be referenced as `TENANT_ID` in the next steps.
168
+
169
+

170
+
171
+
3. Generate an OpenID client secret.
163
172
164
173
In **Azure Active Directory** / **App registrations**, select **ODM Application**:
165
174
@@ -172,7 +181,7 @@ After activating your account by email, you should have access to your Aure AD i
172
181
173
182
>Important: This client secret can not be revealed later. If you forgot to take note of it, you'll have to create another one.
174
183
175
-
3. Add Claims.
184
+
4. Add Claims.
176
185
177
186
In **Azure Active Directory** / **App registrations**, select **ODM Application**, and in **Manage / Token Configuration**:
178
187
@@ -197,37 +206,45 @@ After activating your account by email, you should have access to your Aure AD i
197
206
* Check Security Groups
198
207
* Click Add
199
208
200
-
4. API Permissions.
209
+
5. Create a custom claim named "identity"
210
+
211
+
To allow ODM rest-api to use the password flow with email as user identifier and the client-credentials flow with client_id as user identifier, we need to create a new claim named "identity" that will take the relevant value according to the flow:
212
+
213
+
In **Azure Active Directory** / **Enterprise applications**, select **ODM Application**, and in **Manage / Single sign-on**:
214
+
215
+
* Click on Edit of the "Attributes & Claims" section
216
+
* Click + Add new claim
217
+
* Name: identity
218
+
* Fill 2 Claim conditions in the exact following order:
219
+
1. User Type: Any / Scope Groups: 0 / Source: Attribute / Value: <CLIENT_ID>
220
+
2. User Type: Members / Scope Groups: 0 / Source: Attribute / Value: user.mail
221
+
222
+
6. API Permissions.
201
223
202
224
In **Azure Active Directory** / **App Registration**, select **ODM Application**, and then click **API Permissions**.
203
225
204
226
* Click Grant Admin Consent for Default Directory
205
227
206
-
5. Manifest change.
228
+
7. Manifest change.
207
229
208
230
In **Azure Active Directory** / **App Registration**, select **ODM Application**, and then click **Manifest**.
209
231
210
-
As explained in [accessTokenAcceptedVersion attribute explanation](https://docs.microsoft.com/en-us/azure/active-directory/develop/reference-app-manifest#accesstokenacceptedversion-attribute), change the value to 2 and then click Save.
232
+
As explained in [accessTokenAcceptedVersion attribute explanation](https://docs.microsoft.com/en-us/azure/active-directory/develop/reference-app-manifest#accesstokenacceptedversion-attribute), change the value to 2.
211
233
212
234
ODM OpenID Liberty configuration needs version 2.0 for the issuerIdentifier. See the [openIdWebSecurity.xml](templates/openIdWebSecurity.xml) file.
213
235
214
-
6. Retrieve Tenant and Client information.
215
-
216
-
In **Azure Active Directory** / **App Registration**, select **ODM Application** and click **Overview**:
217
-
218
-
* Application (client) ID: **Client ID**. It will be referenced as `CLIENT_ID` in the next steps.
219
-
* Directory (tenant) ID: **Your Tenant ID**. It will be referenced as `TENANT_ID` in the next steps.
220
-
221
-

236
+
It is also necessary to set **acceptMappedClaims** to true to manage claims. Without this setting, you get the exception **AADSTS50146: This application is required to be configured with an application-specific signing key. It is either not configured with one, or the key has expired or is not yet valid.** when requesting a token.
222
237
223
-
7. Check the configuration.
238
+
Then, click Save.
239
+
240
+
8. Check the configuration.
224
241
225
242
Download the [azuread-odm-script.zip](azuread-odm-script.zip) file to your machine and unzip it in your working directory. This .zip file contains scripts and templates to verify and set up ODM.
226
243
227
-
7.1 Verify the Client Credential Token
244
+
8.1 Verify the Client Credential Token
228
245
229
246
You can request an access token using the Client-Credentials flow to verify the token format.
230
-
This token is used for the deployment between Decision Cennter and the Decision Server console:
247
+
This token is used for the deployment between Decision Center and the Decision Server console:
@@ -565,7 +584,7 @@ Get hands-on experience with IBM Operational Decision Manager in a container env
565
584
566
585
To manage ODM runtime call on the next steps, we used the [Loan Validation Decision Service project](https://github.com/DecisionsDev/odm-for-container-getting-started/blob/master/Loan%20Validation%20Service.zip)
567
586
568
-
Import the **Loan Validation Service** in Decision Center connected as John Doe
587
+
Import the **Loan Validation Service** in Decision Center connected using *myodmuser*@YOURDOMAIN created at step 2
0 commit comments