-
1. Register your application in Azure AD:
- Sign in to the Azure portal and navigate to Azure Active Directory.
- Select "App registrations" and then click "New registration".
- Provide a name for your application: “Aclaimant”
- Choose the appropriate account type (e.g., "Accounts in this organizational directory only")
- Specify the redirect URI (the URL where Azure AD will redirect the user after authentication) as https://api.aclaimant.com/auth/oauth
- Click "Register" to create the application registration.
-
2. Obtain the client ID and client secret:
- After registering the application, you'll find the "Application (client) ID" on the overview page.
- Navigate to "Certificates & secrets" and create a new client secret (if needed).
- Note down the client ID and client secret, as you'll need them later.
-
3. Implement the OAuth 2.0 flow in your application:
- Please provide the following information securely (through dropbox link) to the Aclaimant team
-
OAuth Endpoint
- This is the endpoint for the company IdP, which the user will be redirected to when logging in
-
OAuth Scope
- A comma separated list of access to information Aclaimant will need. These differ by IdP so we need to know what available options are from the company's IT.
- Aclaimant only needs access to the user's email address from the IdP and nothing else. Some IdPs require a value for scope.
-
OAuth Token URL
- The URL which Aclaimant should request a token from the IdP after successful authentication on the IdPs website.
- OAuth Client ID
- OAuth Client Secret
- Note: Depending upon your setup Aclaimant may require OAuth UserInfo URL and OAuth UserInfo Path
Have more questions? Submit a request
Comments
Please sign in to leave a comment.