Microsoft Entra Provider 
Microsoft Entra fully supports the OAuth 2.0 protocol and can therefore be used as a trusted provider for authenticating users and providing their claims.
Setup
A few steps are needed to get Microsoft working as a provider. You'll need to register the Ometa Framework as an application in the Azure portal of Microsoft.
Warning
In the following steps, you will be adding the Ometa Framework as an application to Azure. Don't do this under your personal account, but use an account of your organisation in Azure.
Register the Ometa Framework as an Application
Login to the Microsoft Azure Portal, navigate to the App Registrations and click on New registration.
Fill-in the display name which you want to use for the Ometa Framework.
Note
It is a best practice to name this application using your company's name. When the solution is used by external parties, they will need to provide consent via a user consent prompt. The display name for this application will be used in this user consent screen.
Using your company name increases trust and confidence for external users when providing this information. If you have any further questions about how Ometa processes sensitive information, please refer to the GDPR article.Please refer to the following screenshot for an example of the user consent prompt how an external user sees this:
Choose which account types will be logging in via this application.
Choose Web as platform and fill in the redirect URI. This must be the url of the Ometa Authority Service appended with /signin-microsoft for example: https://ometa-authority.example.com/signin-microsoft.
Click on Register.
Use a Certificate or create a secret
The application has now been registered. The Ometa Authority Service needs a trust relationship with the Microsoft Entra application. This is an extra security check together with a valid redirect uri. You can use a certificate or a secret. A certificate is the recommended way.
- Certificate authentication: This uses a certificate stored on the Ometa server against a certificate (public key) uploaded in the Microsoft Entra application. We recommend this for new installations and production environments as it is more secure.
- Client Secret: This generates a
ClientSecret
that can be used to authenticate a client.
- Click on the Certificates & secrets in the navigation tree on the left of the application registration.
Generating a Self-Signed Certificate
Important
A self-signed certificate should not be used on production environments.
If you don't already have a certificate, a self-signed certificate can be generated using the following steps:
- Ensure that PowerShell version 7 is installed. The version can be checked with the following command:
$PSVersionTable.PSVersion
- You need PowerShell 7.2 or later to use PnP PowerShell. It is available for Windows, Linux and Mac and can be installed through here.
- Install-Module PnP.PowerShell -Scope CurrentUser
- https://pnp.github.io/powershell/articles/installation.html
- The following command can be used to generate the certificate, change the password and names accordingly:
Import-Module PnP.PowerShell
New-PnPAzureCertificate -CertificatePassword (ConvertTo-SecureString -String "verySecurePassword" -AsPlainText -Force) -OutCert "c:\temp\ometa.cer" -OutPfx "c:\temp\ometa.pfx" -CommonName "Ometa Certificate" -Organization "Ometa BV" -Country "BE"
More information about PnP PowerShell can be found here.
Using the Certificate
- Import the certificate on the Ometa server under local machine, using the
.pfx
file. - Upload the certificate to the Application in the Azure portal.
- Go to the App Registrations
- Select the application used in the profile (or provider). The
ClientID
of the Ometa configuration should match theApplication (client) ID
in the Azure portal. - Upload the certificate in the Certificates & secrets section.
Configure the certificates in the framework.
- For SharePoint / BuildingBlock / Mail BuildingBlocks, this is the
SharePointOnlineAzureADCertificate
field in the profiles. The value should be the subject name and can be found in the details of the certificate in the Computer Certificates.
This profile configuration can also be applied to SharePoint profiles, BuildingBlock profiles and any other Mail BuildingBlock profiles. See below for a full list.
- For the Microsoft provider, fill-in the
Certificate Subject
field.
Configuration in the Ometa Framework
If you intend to use the same authentication method throughout the framework, check the following configurations:
- Microsoft Provider: configure the Microsoft provider for logging in with the Microsoft account, found in Application Menu > Security > Providers. Requires
Directory.Read.All
application andUser.Read
delegated permissions. - Mail Building Block profiles: requires profile configuration and
Mail.Send
application permissions. - SharePoint profiles: requires profile configuration and
Sites.FullControl.All
application orSites.Selected
application permissions. - BuildingBlock profiles: requires profile configuration and
Sites.FullControl.All
application orSites.Selected
application permissions. - Generic REST:
config.SharePointAuthentications
must be configured, see the Service Settings section: requiresSites.FullControl.All
application orSites.Selected
application permissions.
API Permissions
By default, only the API permission User.Read is added and is user-consent based. This means that a user, who tries to login, will have to give consent to the Ometa Framework for reading its profile information like their name and e-mail. This consent must be given the very first time a user tries to login with Microsoft via our framework.
Permission Directory.Read.All
To be able to read the AD group memberships of your users in Azure AD, you'll need to set an extra permission named Directory.Read.All on the application registration. This enables our framework to read and refresh active directory information and group memberships.
- Click on the API permissions in the navigation tree on the left of the application registration
- Click on Add a permission
- Click on the tile Microsoft Graph
- Choose Application permissions as permission type
- Choose Directory.Read.All and click Add permissions
Warning
This permission requires admin consent. This can be configured following the steps below. Failure do to so will disable the functionality regarding security with AD group memberships.
Admin Consent
Microsoft has made it possible to bypass the user consent screen for any permissions configured on an application registration. This comes in handy if you don't want to bother your users with the consent screen the first time they login to the Ometa Framework with their Microsoft account. An admin consent for Directory.Read.All is always required if you want to fetch the ad group memberships of signed-in users.
- Click on the API permissions in the navigation tree on the left of the application registration
- Click on Grant admin consent for your organization and confirm your choice
You'll see that the User.Read and the Directory.Read.All permissions are now consented by an admin.
Note
Bypassing the consent screen is only possible for users within your organization. Users from other organizations or with a personal microsoft account will still have to give consent the very first time they try to logon.
Claims
The following claims are provided by Microsoft when a user successfully authenticates itself.
- objectidentifier
- nameidentifier
- tenantid
- name
- givenname
- surname
- emailaddress
- adgroup (zero, one or multiple times depending on the memberships of the user)
An example:
Type | Value |
---|---|
objectidentifier | 7dd7d026-146d-42e0-8f24-49cedcdf1b38 |
nameidentifier | 58ce8d03-5a68-4695-904a-2f6975Ba7164 |
tenantid | ffe74249-a2ee-4a6d-943f-353aa2bdf90c |
name | John Doe |
givenname | John |
surname | Doe |
emailaddress | john.doe@ometa.net |
adgroup | Developers |
adgroup | External |
adgroup | General |
Important
- The objectidentifier claim contains a unique id identifying your user tenant and application wide. This id will never change on the microsoft identity platform.
- The nameidentifier claim uniquely identifies your user within the application registration. Do not use this id to match a user with other application registrations.
User Consent
Note
This information only applies if you didn't consent as an administrator for all users within your organization or the user, who tries to login, is not part of your organization.
The first time a user will use the Microsoft login to authenticate themself for using the Ometa Framework, they will need to give consent to the Ometa Framework for receiving information like their e-mail address and name.
Note
If the user doesn't give consent, he/she will not be able to use the Ometa Framework.
The consent must be given only once.
Throubleshooting
Need Admin Approval
If you get the Need admin approval popup, your IT administrator can either:
Allow users to consent applications themselves in the Azure user settings.
Grant admin consent themselves to the Ometa Framework application.
This also applies when inviting external users.
The IT administrator can revoke the access at any time by going to the app registration in Azure.