Dot
HomeLogin
  • Dot
    • What's Dot?
      • Getting started
      • Chat
      • Model
      • User Feedback
      • Permissions
      • API
      • Embed
    • Integrations
      • Snowflake
      • BigQuery
      • Redshift
      • AWS Athena
      • Databricks
      • Postgres
      • Microsoft SQL Server
      • MySQL / MariaDB
      • DuckDB
      • SAP HANA
      • Looker
      • dbt Semantic Layer
      • Slack
      • Microsoft Teams
      • Azure Active Directory
      • Okta
      • BI Tools
        • Tableau
        • Metabase
        • PowerBI (planned)
        • Sigma (planned)
        • Qlik (planned)
    • Security & Privacy
    • Support
Powered by GitBook
On this page
  • Integrating Single Sign-On (SSO) with Azure for Dot
  • Step 1: Register a New Application in Azure
  • Step 2: Application Registration
  • Step 3: Application Overview
  • Step 4: Certificates & Secrets
  • Step 5: Adding the Client Secret
  • Step 6: Integrating with Dot
  • Step 7: Metadata URL
  • Finalizing the Integration
  • Configure Which Users Get Access
  1. Dot
  2. Integrations

Azure Active Directory

Single Sign On - effortless entrance

PreviousMicrosoft TeamsNextOkta

Last updated 2 months ago

Integrating Single Sign-On (SSO) with Azure for Dot

Follow these steps to create and configure a Single Sign-On (SSO) integration with Microsoft Azure for the Dot application.

Step 1: Register a New Application in Azure

  1. Go to the Azure portal and navigate to Azure Active Directory > App registrations.

  2. Click on New registration.

Step 2: Application Registration

  1. Enter the name of the application, for example, Dot Azure SSO.

  2. Under Supported account types, select the relevant option for your organization.

  3. For the Redirect URI, input the URI provided by your Dot settings.

Step 3: Application Overview

  1. Once the application is registered, you will be redirected to the application's overview page.

  2. Copy the Application (client) ID and Directory (tenant) ID and save it for later use.

Step 4: Certificates & Secrets

  1. In the application's menu, click on Certificates & secrets.

  2. Click on New client secret.

  3. Add a description for the secret and set an expiry as required.

  4. Once created, copy the value of the client secret.

Step 5: Adding the Client Secret

  1. You can now see the newly created client secret listed.

  2. Note the secret's value, as it will be used in the Dot application configuration.

Step 6: Integrating with Dot

  1. With the Application (client) ID and Client Secret copied, navigate to your Dot settings.

  2. Paste these values into the corresponding fields in the Dot Azure SSO settings.

Step 7: Metadata URL

  1. The Metadata URL is essential for SSO operations. Construct it using your Azure tenant ID that you have got in step 3:

    • Format: https://login.microsoftonline.com/{tenant-id}/v2.0/.well-known/openid-configuration

Finalizing the Integration

Once you've completed the above steps:

  1. Save the configuration in Dot.

  2. Test the SSO integration to ensure that it's functioning correctly.

Configure Which Users Get Access

  1. In Azure, go to the "Enterprise application" created for Dot authentication and on the left change to "Manage" -> "Users and Groups"

  2. Press "Add user / group" and then add single users or groups that should be able to login

  1. Then on the left change to "Manage" -> "Properties"

  1. Activate "Assignment required" → Now only users directly assign to this application by user or group can use the SSO in Dot to login