Table of Contents

Microsoft Entra Provider Microsoft

Microsoft Entra fully supports the OAuth 2.0 protocol and can therefore be used as a trusted provider for authenticating users and providing their claims.

Setup

A few steps are needed to get Microsoft working as a provider. You'll need to register the Ometa Framework as an application in the Azure portal of Microsoft.

Warning

In the following steps, you will be adding the Ometa Framework as an application to Azure. Don't do this under your personal account, but use an account of your organisation in Azure.

Register the Ometa Framework as an Application

  1. Login to the Microsoft Azure Portal, navigate to the App Registrations and click on New registration.

  2. Fill-in the display name which you want to use for the Ometa Framework.

    Note

    It is a best practice to name this application using your company's name. When the solution is used by external parties, they will need to provide consent via a user consent prompt. The display name for this application will be used in this user consent screen.
    Using your company name increases trust and confidence for external users when providing this information. If you have any further questions about how Ometa processes sensitive information, please refer to the GDPR article.

    Please refer to the following screenshot for an example of the user consent prompt how an external user sees this:

    External guests accounts

  3. Choose which account types will be logging in via this application.

  4. Choose Web as platform and fill in the redirect URI. This must be the url of the Ometa Authority Service appended with /signin-microsoft for example: https://ometa-authority.example.com/signin-microsoft.

  5. Click on Register.

Register Application

Use a Certificate or create a secret

The application has now been registered. The Ometa Authority Service needs a trust relationship with the Microsoft Entra application. This is an extra security check together with a valid redirect uri. You can use a certificate or a secret. A certificate is the recommended way.

  • Certificate authentication: This uses a certificate stored on the Ometa server against a certificate (public key) uploaded in the Microsoft Entra application. We recommend this for new installations and production environments as it is more secure.
  • Client Secret: This generates a ClientSecret that can be used to authenticate a client.
  1. Click on the Certificates & secrets in the navigation tree on the left of the application registration.

Generating a Self-Signed Certificate

Important

A self-signed certificate should not be used on production environments.

If you don't already have a certificate, a self-signed certificate can be generated using the following steps:

  • Ensure that PowerShell version 7 is installed. The version can be checked with the following command: $PSVersionTable.PSVersion
  • You need PowerShell 7.2 or later to use PnP PowerShell. It is available for Windows, Linux and Mac and can be installed through here.
  • The following command can be used to generate the certificate, change the password and names accordingly:
Import-Module PnP.PowerShell
New-PnPAzureCertificate -CertificatePassword (ConvertTo-SecureString -String "verySecurePassword" -AsPlainText -Force) -OutCert "c:\temp\ometa.cer" -OutPfx "c:\temp\ometa.pfx" -CommonName "Ometa Certificate" -Organization "Ometa BV" -Country "BE"

More information about PnP PowerShell can be found here.

Using the Certificate

  • Import the certificate on the Ometa server under local machine, using the .pfx file.
  • Upload the certificate to the Application in the Azure portal.
    • Go to the App Registrations
    • Select the application used in the profile (or provider). The ClientID of the Ometa configuration should match the Application (client) ID in the Azure portal.
    • Upload the certificate in the Certificates & secrets section.

Upload Certificate on Azure portal

Configure the certificates in the framework.

  • For SharePoint / BuildingBlock / Mail BuildingBlocks, this is the SharePointOnlineAzureADCertificate field in the profiles. The value should be the subject name and can be found in the details of the certificate in the Computer Certificates.

Set Certificate in Ometa Profile

This profile configuration can also be applied to SharePoint profiles, BuildingBlock profiles and any other Mail BuildingBlock profiles. See below for a full list.

  • For the Microsoft provider, fill-in the Certificate Subject field.

Set Certificate in Microsoft Provider

Configuration in the Ometa Framework

If you intend to use the same authentication method throughout the framework, check the following configurations:

API Permissions

By default, only the API permission User.Read is added and is user-consent based. This means that a user, who tries to login, will have to give consent to the Ometa Framework for reading its profile information like their name and e-mail. This consent must be given the very first time a user tries to login with Microsoft via our framework.

Permission Directory.Read.All

To be able to read the AD group memberships of your users in Azure AD, you'll need to set an extra permission named Directory.Read.All on the application registration. This enables our framework to read and refresh active directory information and group memberships.

  • Click on the API permissions in the navigation tree on the left of the application registration
  • Click on Add a permission
  • Click on the tile Microsoft Graph
  • Choose Application permissions as permission type
  • Choose Directory.Read.All and click Add permissions

Graph API

Warning

This permission requires admin consent. This can be configured following the steps below. Failure do to so will disable the functionality regarding security with AD group memberships.

Microsoft has made it possible to bypass the user consent screen for any permissions configured on an application registration. This comes in handy if you don't want to bother your users with the consent screen the first time they login to the Ometa Framework with their Microsoft account. An admin consent for Directory.Read.All is always required if you want to fetch the ad group memberships of signed-in users.

  • Click on the API permissions in the navigation tree on the left of the application registration
  • Click on Grant admin consent for your organization and confirm your choice

You'll see that the User.Read and the Directory.Read.All permissions are now consented by an admin.

Admin Consent

Note

Bypassing the consent screen is only possible for users within your organization. Users from other organizations or with a personal microsoft account will still have to give consent the very first time they try to logon.

Claims

The following claims are provided by Microsoft when a user successfully authenticates itself.

  • objectidentifier
  • nameidentifier
  • tenantid
  • name
  • givenname
  • surname
  • emailaddress
  • adgroup (zero, one or multiple times depending on the memberships of the user)

An example:

Type Value
objectidentifier 7dd7d026-146d-42e0-8f24-49cedcdf1b38
nameidentifier 58ce8d03-5a68-4695-904a-2f6975Ba7164
tenantid ffe74249-a2ee-4a6d-943f-353aa2bdf90c
name John Doe
givenname John
surname Doe
emailaddress john.doe@ometa.net
adgroup Developers
adgroup External
adgroup General
Important
  • The objectidentifier claim contains a unique id identifying your user tenant and application wide. This id will never change on the microsoft identity platform.
  • The nameidentifier claim uniquely identifies your user within the application registration. Do not use this id to match a user with other application registrations.
Note

This information only applies if you didn't consent as an administrator for all users within your organization or the user, who tries to login, is not part of your organization.

The first time a user will use the Microsoft login to authenticate themself for using the Ometa Framework, they will need to give consent to the Ometa Framework for receiving information like their e-mail address and name.

Note

If the user doesn't give consent, he/she will not be able to use the Ometa Framework.

The consent must be given only once.

Consent

Throubleshooting

Need Admin Approval

If you get the Need admin approval popup, your IT administrator can either:

  • Allow users to consent applications themselves in the Azure user settings. User settings

  • Grant admin consent themselves to the Ometa Framework application.

This also applies when inviting external users.

Need admin approval

The IT administrator can revoke the access at any time by going to the app registration in Azure.