# Azure Active Directory

## Integrating Single Sign-On (SSO) with Azure for Dot

Follow these steps to create and configure a Single Sign-On (SSO) integration with Microsoft Azure for the Dot application.

### Step 1: Register a New Application in Azure

1. Go to the Azure portal and navigate to **Azure Active Directory** > **App registrations**.
2. Click on **New registration**.

### Step 2: Application Registration

1. Enter the name of the application, for example, `Dot Azure SSO`.
2. Under **Supported account types**, select the relevant option for your organization.
3. For the **Redirect URI**, input the URI provided by your Dot settings.

<figure><img src="https://3709841693-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FCeRlmJf2y704TpjpubE1%2Fuploads%2F95B2cpeYfyOP0fSkNUOZ%2FScreenshot_from_2024-01-16_13-53-20.png?alt=media&#x26;token=88aaed7b-f612-4ea3-9af9-0e79d9ffa5f3" alt=""><figcaption></figcaption></figure>

### Step 3: Application Overview

1. Once the application is registered, you will be redirected to the application's overview page.
2. Copy the **Application (client) ID** and **Directory (tenant) ID** and save it for later use.

<figure><img src="https://3709841693-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FCeRlmJf2y704TpjpubE1%2Fuploads%2FFu4GPC2aufgjOWKhs5jR%2FScreenshot_from_2024-01-16_13-53-41.png?alt=media&#x26;token=77e42d20-84d0-4876-bcc2-35b0beb931c9" alt=""><figcaption></figcaption></figure>

### Step 4: Certificates & Secrets

1. In the application's menu, click on **Certificates & secrets**.
2. Click on **New client secret**.
3. Add a description for the secret and set an expiry as required.
4. Once created, copy the value of the client secret.

<figure><img src="https://3709841693-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FCeRlmJf2y704TpjpubE1%2Fuploads%2FUt0T0xfrt4htry1yQP0d%2FScreenshot_from_2024-01-16_13-54-20.png?alt=media&#x26;token=063903eb-1dd2-46e3-8cd7-d9b7ba470bee" alt=""><figcaption></figcaption></figure>

### Step 5: Adding the Client Secret

1. You can now see the newly created client secret listed.
2. Note the secret's value, as it will be used in the Dot application configuration.

<figure><img src="https://3709841693-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FCeRlmJf2y704TpjpubE1%2Fuploads%2FAeCTnRoNX41DWaWmPnk0%2FScreenshot_from_2024-01-16_13-54-30.png?alt=media&#x26;token=096cb800-4645-480d-9371-29701a2874c3" alt=""><figcaption></figcaption></figure>

### Step 6: Integrating with Dot

1. With the **Application (client) ID** and **Client Secret** copied, navigate to your Dot settings.
2. Paste these values into the corresponding fields in the Dot Azure SSO settings.

### Step 7: Metadata URL

1. The Metadata URL is essential for SSO operations. Construct it using your Azure tenant ID that you have got in step 3:
   * Format: `https://login.microsoftonline.com/{tenant-id}/v2.0/.well-known/openid-configuration`

### Finalizing the Integration

Once you've completed the above steps:

1. Save the configuration in Dot.
2. Test the SSO integration to ensure that it's functioning correctly.

## Configure Which Users Get Access

1. In Azure, go to the "Enterprise application" created for Dot authentication and on the left change to "Manage" -> "Users and Groups"
2. Press "Add user / group" and then add single users or groups that should be able to login

<figure><img src="https://3709841693-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FCeRlmJf2y704TpjpubE1%2Fuploads%2F25gUYFJR8rP6YI0qhd8H%2Fimage.png?alt=media&#x26;token=7f03b213-49a8-43d9-a853-536feb4935be" alt=""><figcaption></figcaption></figure>

3. Then on the left change to "Manage" -> "Properties"

<figure><img src="https://3709841693-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FCeRlmJf2y704TpjpubE1%2Fuploads%2FXWDOdPF5DpnXLxSOzpWA%2Fimage.png?alt=media&#x26;token=2382602f-82df-4653-a5e3-765141d8201f" alt=""><figcaption></figcaption></figure>

4. Activate "Assignment required" → Now only users directly assign to this application by user or group can use the SSO in Dot to login
