Azure OAuth 2.0 Setup (for SSO)

  • 1. Register your application in Azure AD:
    • Sign in to the Azure portal and navigate to Azure Active Directory. 
    • Select "App registrations" and then click "New registration". 
    • Provide a name for your application: “Aclaimant”
    • Choose the appropriate account type (e.g., "Accounts in this organizational directory only")
    • Specify the redirect URI (the URL where Azure AD will redirect the user after authentication) as https://api.aclaimant.com/auth/oauth
    • Click "Register" to create the application registration. 

  • 2. Obtain the client ID and client secret:
    • After registering the application, you'll find the "Application (client) ID" on the overview page. 
    • Navigate to "Certificates & secrets" and create a new client secret (if needed). 
    • Note down the client ID and client secret, as you'll need them later. 

  • 3. Implement the OAuth 2.0 flow in your application:
    • Please provide the following information securely (through dropbox link) to the Aclaimant team
    • OAuth Endpoint
      • This is the endpoint for the company IdP, which the user will be redirected to when logging in
    • OAuth Scope
      • A comma separated list of access to information Aclaimant will need. These differ by IdP so we need to know what available options are from the company's IT. 
      • Aclaimant only needs access to the user's email address from the IdP and nothing else. Some IdPs require a value for scope.
    • OAuth Token URL
      • The URL which Aclaimant should request a token from the IdP after successful authentication on the IdPs website.
    • OAuth Client ID
    • OAuth Client Secret
    • Note: Depending upon your setup Aclaimant may require OAuth UserInfo URL and OAuth UserInfo Path
Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

Comments

0 comments

Please sign in to leave a comment.