LATEST VERSION: 1.5 - CHANGELOG
Single Sign-On v1.5

Azure Active Directory OIDC Integration Guide Overview

This documentation introduces how to set up Azure Active Directory (Azure AD) with Open ID Connect (OIDC) as the identity provider for the Single Sign-On service running on Pivotal Cloud Foundry (PCF).

Azure Active Directory (Azure AD) is Microsoft’s multi-tenant cloud-based directory and identity management service.

To set up Azure AD with Security Assertion Markup Language (SAML), see the Azure Active Directory SAML Integration Guide.

Prerequisites

To integrate Azure AD with Single Sign-On service using OIDC, you need the following:

Pivotal

  • PCF v1.12 or later

  • Single Sign-On v1.5.0 or later

Azure AD

  • An active Azure AD tenant

  • A user with admin privileges

Note: To configure OIDC, you must have the Single Sign-On service broker installed on your PCF deployment. You need to create a plan, grant any plan administrators, and specify any organizations this plan should be the authentication authority for. For help configuring plans, see the Manage Service Plans topic.

Azure AD Integration Guide

Configuring Azure AD with SSO

Complete the following steps to integrate your deployment with Azure AD and SSO.

  1. Configure Azure AD as an OIDC Identity Provider

  2. Configure a Single Sign-On Service Provider

Testing and Troubleshooting

Create a pull request or raise an issue on the source for this page in GitHub