Azure AD Application Setup

The Azure AD Application setup process is described below. These steps below should guide you through the entire process.

Before you begin, please note: Azure requires an SSL certificate to be installed on your site for authentication to work. You will not be able to add Azure authentication if your site cannot be reached over https.

    1. Log into the Azure Portal.
    2. Click the 'New registration' link.Azure Application - New Registration
    3. Fill out the Name - A title for your application. Your website title is a good example.
      Azure Application - App Details
    4. Select the appropriate Supported Account Types option for your site.
    5. Fill out the Redirect URI's for your website. This should be your full Homepage URL with index.php at the end. Add the following URL (replacing with your actual domain name). Redirect URIs are restricted to https and if you have other ways to access your domain (like www and non-www), add them all here, like the following:
      Azure Application - Redirect URIs
    6. Click the 'Register' button.
    7. Click on the 'Authentication' link in the Manage menu.Azure Application - Auth Menu
    8. Live SDK Support - We have this switched to No in our application.
    9. Implicit grant and hybrid flows - Enable 'Access Tokens' and 'ID tokens'
    10. Don't forget to click the 'Save' button at the top of the page.
    11. Click on the 'Certificates & secrets' link in the Manage menu.
    12. Click the 'New Client Secret' button. Fill out a description, length of time for the secret to be valid and click the 'Add' button.Azure Application - Client Secret
    13. A new client secret will be created and only displayed one time in a popup window. Make sure to copy this value for later use. If you forget, you can delete the secret and generate a new value.Azure AD - Copy Client Secret from this column
    14. Use the Application ID and Application Secret (described in steps 9-11) in the JFBConnect settings for Azure AD Client ID and Client Secret. At this point, JFBConnect is ready for Azure AD authentication.