This section provides a quick walk-through of configuring Azure Active Directory (free tier) (for enabling Azure Active Directory-based authentication in Orchid Fusion VMS). Specifically this section will guide you through the following:

  • Creating a free Microsoft Account (if needed)
  • Creating an Azure Active Directory user
  • Creating an Azure Active Directory group
  • Registering an Azure Active Directory app

Microsoft Azure Active Directory Account Setup and Portal Login

  1. If you do not have a Microsoft account, create a free account here: https://account.microsoft.com/account
  2. Log into the Azure Active Directory (free tier) portal using your Microsoft account: https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview

Create an Azure Active Directory User

  1. Enter a name for the user in the User name field. (This is a short name that you use to sign in, like TJones @ ipconfigure.com.)
  2. Enter the formal (long) name for the user in the Name field (like Tom Jones).

Create an Azure Active Directory Group

  1. You will need to create at least one Azure Active Directory Group with at least one member.
    1. Select a type from the Group type drop-down.
    2. Enter a name for the group in the Group name field.
    3. Select group members by clicking on the Members link.

Register an Azure Active Directory App

  1. To register a New app, be sure to set the following:
    1. Enter the user-facing display name for this application in the Name field.
    2. Select the Single Tenant option under Supported Account Types.
    3. Select the Client Application option under Platform Configuration.

Azure AD App – Authentication – Add a Web Platform

  1. Go to Authentication, then select Add a platform.
    1. Select the Web type application.
    2. Enter the Fusion redirect URL: http(s)://<fusion-url>/redirect.html in the Redirect URIs field (where <fusion-url> is the URL for your Fusion server).

Azure AD App – API Permissions

  1. Go to API permissions, then select Add a permission.
    1. Select the Microsoft Graph.
    2. Select the Directory.Read.All delegated permission.

  1. Select Grant admin consent for your application.

Azure AD App – Certificates & Secrets – Create a New Client Secret

  1. Select New client secret to create a new secret value.
  2. Save the secret value because it will not be available later. (Copy the secret value to a secure location.)

Azure AD App – Save the Client ID and OAuth 2.0 Authorization Endpoint (v1)

  1. Go to the Overview.
    1. Make note of the Azure Application (client) ID value for later use.
  2. Select Endpoints.
    1. Make note of the OAuth 2.0 authorization endpoint (v1) value for later use.

At this point, you should have all of the required values to enable Azure Active Directory-based authentication in Orchid Fusion VMS. Return to the previous section (Enabling Azure Active Directory) for instructions on modifying the Orchid Fusion VMS configuration file to enable Azure Active Directory authentication. Once enabled, you may add one or more Orchid Fusion VMS Permission Groups that pull users from your Azure Active Directory. (For details on adding Permission Groups, please refer to the Add a Permission Group for Azure Active Directory section in the Orchid Fusion VMS Administrator Guide.)

Feedback

Was this helpful?

Yes No
You indicated this topic was not helpful to you ...
Could you please leave a comment telling us why? Thank you!
Thanks for your feedback.

Post your comment on this topic.

Please do not use this for support questions.
IPConfigure Technical Support

Post Comment