Azure AD OIDC Setup Guide
Example instructions for setting up Azure AD as a single sign-on source via OIDC.
Last updated
Was this helpful?
Example instructions for setting up Azure AD as a single sign-on source via OIDC.
Last updated
Was this helpful?
If you'd like to set up the ability to sign in to your Spacelift account using an OIDC integration with Azure AD, you've come to the right place. This example will walk you through the steps to get this setup, and you'll have single sign-on running in no time!
Spacelift account, with access to admin permissions
Azure account, with an existing Azure Active Directory
You'll need permissions to create an App Registration within your Azure AD
You'll need to visit the Spacelift account settings page to set up this integration, from the navigation side bar menu, select "Settings."
Next, you'll want to click the Set Up box underneath the "OIDC Settings" section. This will expand some configuration we will need to fill out in a few minutes, which we will be obtaining from Azure. For now, copy the authorized redirect URL as we will need to provide Azure this URL when configuring our Azure App Registration within your Azure AD.
Within your Azure Account, navigate to your Azure Active Directory where you'd like to setup the OIDC integration for. In this guide, we are using a Default Directory for example purposes.
While you are within your Active Directory's settings, click on App registrations from the navigation, and then select New registration.
Configure your supported account types as per your login requirements. In this example, we are allowing Accounts in this organizational directory access to Spacelift.
Remember the authorized redirect URL we copied earlier from Spacelift? We'll need that in this step. You'll want to paste that URL into the Redirect URI input as shown. Make sure you select Web for the type.
Click Register.
Start by navigating to the Token configuration section of your application.
Click the Add optional claim button, choose the ID token type, and select the upn claim:
Click the Add button, making sure to enable the Turn on the Microsoft Graph profile permission checkbox on the popup that appears:
Navigate to the Certificates & secrets section of your application.
Click the New client secret button.
Give your secret a Description.
Define an Expires duration.
Click Add.
Now that we have the Client secret setup for our application, we'll need to take the Value and copy this into our Spacelift OIDC settings within the Secret input.
Value within Azure AD = Spacelift's Secret input
The best way we've found to obtain the Client ID and Provider URL is to perform the following steps:
Click on Overview within your Azure App.
On this page Application (client) ID. Copy this value to Spacelift as the Client ID
Next, Click Endpoints which should expand a page with the endpoints for your App.
Copy the portion of the OpenID Connect metadata document URL that is highlighted as shown in the screenshot, and paste the value into Spacelift as the Provider URL.
In summary, here are the values that should be copied over to Spacelift:
Application (client) ID within Azure AD => Client ID on Spacelift
Secret Value you generated => Secret input on Spacelift
OpenID Connect metadata document URL => Provider URL on Spacelift
Click Save.
That's it! Your OIDC integration with Azure AD should now be configured (as per this example). Feel free to make any changes to your liking within your Azure AD App Registration configuration for the app that you just created.
Give your application a name - Spacelift sounds like a good one