2. Azure SSO#
With Azure SSO, you can use just one set of credentials to conveniently access TrustView and any other Azure related apps.
Tip
More information can be found here.
2.1. Configure Azure Single sign-on (SSO)#
Sign in to the Microsoft Entra admin center (Microsoft Entra) as at least a
Cloud Application Administrator
.Browse to
Identity
Applications
App registrations
and selectNew registration
.Specify a
name
.Specify
Supported account types
.Under
Redirect URI
specifyWeb
and type theURL
of your TrustView instance.1<trustview endpoint>/azuressoTip
Example: https://trustview.local/azuresso
Select
Register
to complete the initial app registration.You will now see the newly created app registration.
Save the
clientID
,ObjectID (subscription ID)
andTenant ID
as you will need it for the configuration in TrustView.You then need to add a secret. Go to
Certificates & secrets
and clickNew client secret
.Save the
secret value
.You have now created a client that can be used for Azure SSO in TrustView.
But before you are ready, you need to add another API permission:
Select
API permissions
Click
Add a permission
Click
Microsoft Graph
Click
Application permissions
Select permission
GroupMember.Read.All
andUser.Read.All
Click
Add permissions
Tip
If you can’t find the necessary permissions, you can search for them, in the search field.
Lastly the newly added permission, has to be granted. Click
Grant admin consent for <domain>
.Log into TrustView with a global admin user and browse to
Global settings
.You then need to type in the
clientID
,ObjectID
,Tenant ID
and thesecret
created.
Type
clientID
into client IDType
objectID
into subscription IDType
tenant Id
into tenant IDType
secret
into client secretClick
update
.Under
Users, organizations and contacts
in TrustView, you can see a button to settings for Azure single sign-on (SSO), where it will be possible to map Azure groups to TrustView Overview of roles.On the login page a link to Azure SSO will be visible:
Log on with Azure Single sign on? Click here.