Last updated
Last updated
OpenGovernance supports a variety of Identity Providers to authenticate users.
To setup SSO, go to Administration -> SSO.
You will need ClientID, ClientSecret and Issuer.
If you need help generating this, we've included
Azure account, with an existing Azure Active Directory
You'll need permissions to create an App Registration within your Azure AD
Log in to your Microsoft Azure portal and go to Azure Active Directory.
Click Properties and save your Tenant ID for later.
Under Manage, select App registrations.
Click New Registration
On the Register an application page, give the application a name. (OpenGovernance)
Set Supported account types to Accounts in this organizational directory only (Default Directory only - Single tenant).
Click Register.
Copy the Application (client) ID and save for later.
Click Add a Redirect URI.
Under Platform configurations, click Add a platform.
Select Web.
The Redirect URI is https://<call-back>/sso/oidc/callback
.
Click Configure.
Under Manage, select Certificates & secrets.
Click New client secret.
Give the secret a name and set the expiration date to your company's policy.
Create client credentials and Add Redirect URL. Select Add a secret.
Copy the Value.
In the automation page, there is a oidc.yaml filter. Replace vales withpage to enter the copied Client ID, Client Secret, Redirect URI and Issuer URL values.
Enter https://login.microsoftonline.com/<YOUR_TENANT_ID>/v2.0
as the Issuer URL, substituting your Tenant ID for <YOUR_TENANT_ID>
, to finish the configuration.