Microsoft Azure Integration
This document will outline both the Microsoft Azure
setup process as well as the MikroCloud
setup process in order to get you on your feet quickly.
Microsoft Azure Setup
Step 1: Log into your Azure Portal
- Log into your active Microsoft Azure portal.
- Open a web browser and navigate to your Azure portal.
Step 2: Navigate to Microsoft Entra ID (Azure Active Directory)
- From the search bar at the top of your screen, search for
Microsoft Entra ID
. - When you see the
Microsoft Entra ID
pop up menu, click on the link and navigate to your Entra ID.
Step 3: App Registration
- From the left hand menu on your
Entra Overview Page
, click onManage
and then scroll down until you findApp Registrations
.
- Click on the
App Registrations
page in order to begin the setup of your new application.
Step 4: Register a New Application
- From yur
App Registrations
page, click on the+ New registration
button at the top of your screen.
- Enter the following details for your application:
Detail: Description Name This will be the user-facing display name for the application. (This name can be changed and it will be the name of the application that the user sees when they authenticate with the captive portal.) Supported Account Types Choose the option that best suites your use case.
For internal access only, we suggest using thePrivate only - Single Tenant
option.
For other use cases like public facing, you can use theAny Microsoft Entra ID tenant - Multitenant and personal accounts option
.Redirect URI For this option, we reccommend using the Web
as the platform type andhttps://captive.mkcld.io/callback
as the callback URL.
- Confirm that all of the settings are correct, and then proceed to click on the
Register
button at the bottom of the page.
- Give the portal a brief moment to configure the new application.
- You will then be taken to the
Overview
page for your new application.
Note down your Application (client) ID
and Directory (tenant) ID
, this will be used later on during the MikroCloud IDP Setup phase.
Step 5: Create your Client Secret
- From your
App registrations Overview
page, navigate to theManage -> Certificates & secrets
page in order to start the process for creating yourClient Secret
.
- From the
Client Secrets
tab on this page, continue to click on the+ New client secret
to create the client secret.
- To the right-hand side, a new menu page will open up, continue to fill in the
Description
and theExpires
items.- You can give the description any name you want, and you can choose which item will best suite your use case.
- In the Expires drop-down menu, you can select any item you would like.
- When you have confirmed that all of your settings are correct, you can click on the
Add
button at the bottom of this sidebar. - Give the portal a second or so to configure your new settings and create your client secret. When it is done, you will be returned to the
Certificates & Secrets
page with a new secret which you have configured.
When you are on this page, note down the secret's Value
.
- As soon as you leave this page, and or refresh the page, you will not be able to see the value again, so proceed cautiously!
You have now successfully set up your application in your Azure portal, and it is ready for the next phase of the deployment, which is to configure the IDP instance from your MikroCloud portal.
MikroCloud IDP Setup
Once you have set up the Azure side of the Identity Provider, you can now continue to set up the MikroCloud side of the Identity Provider, follow the steps below in order to get it set up and running.
Step 1: Navigate to your Identity Providers
- From your MikroCloud
Dashboard
, navigate toSettings -> Identity Providers
, this will take you to the Overview page for the Identity Providers setting.
- Once you are on the
Identity Providers Overview
page, you can click on the `Get Started button at the top of the page.
Step 2: Create your IDP Integration
- Once you have clicked on the
Get Started
button, a new widget will pop up which will allow you to configure your IDP settings.
- Fill out the following information into your configuration widget.
Option | Description |
---|---|
Name | Give your Integration a descriptive and unique name. |
Identity Provider | From the Identity Provider drop-down menu, select Microsoft Azure as your IDP. |
Client ID | Enter the client ID that you noted down earlier into this text box. |
Client Secret | Enter the client secret that you noted down earlier into this text box. |
Tenant ID | Enter your Tenant ID into this box. |
- When you are happy with your changes, you can continue to click on the
Save
button.
Your Identity Provider has now successfully been set up and you can now create your Captive Portal instance.
Was this page helpful?