To log in to the Microsoft Azure Portal, go to https://portal.azure.com.
- You are responsible for your own connection. AEB does have standard documentation available offering several examples, however. Please reach out to your AEB representative for assistance.
1. Setting up the Azure Active Directory application
Proceed as follows:
- You must be a global administrator or administrative user capable of creating enterprise applications.
- Open Azure Services – Azure Active Directory.
- Go to the App Registrations menu and select New Registration to register a new app.
- Enter the name of the app. Example: AEB SE SSO (Test).
- Set access to the app to Single tenant.
- As Redirect URI, enter the URL transmitted by AEB, e.g.: “https://test.idp.aeb.com/auth/realms/aeb/broker/<example>/endpoint”.
- Click Register to register the app.
- Under API permissions, click Grant admin consent for AEB SE to grant the necessary authorizations.
- Under Certificates & secrets, create a client secret with the appropriate validity.
- Important: Copy and save the client secret you create so that you can later share it with AEB.
2. Transmitting data to AEB
Transmit the following data to AEB so that AEB can connect the application:
- Application (client) ID: This can be found in the new App Registration under Overview.

- OpenID Connect metadata document: This can be found in the new App Registration under Overview – Endpoints.

- Client secret: The previously saved client secret of the application.
3. Assigning rights in the enterprise application (optional)
- This option is relevant if you opted for Creating roles and rights for single sign-on (SSO).
You can restrict the application to certain users or groups.
Proceed as follows:
- Open Azure Services – Azure Active Directory.
- Under Enterprise applications, select the appropriate application.
- Under Properties, go to User assignment required? and set it to Yes.
- Under Users and groups, click +Add user to select users or groups that are authorized to log in through the application.
4. Emitting Azure Active Directory groups in the token (optional)
Option 1
- This option is relevant if you opted for Creating roles and rights for single sign-on (SSO).
If you wish to map groups from your Azure Active Directory (see also Creating roles and rights for single sign-on (SSO)), you must emit them in the token. This is the only way to enable automatic role assignment in AEB applications. This is done by first adding the roles to the application, then assigning them to users or groups in the enterprise application.
- AEB recommends this emission approach.
Proceed as follows to add roles to the application:
- Open Azure Services – Azure Active Directory.
- Under App Registrations, select the appropriate application.
- Under Manifest, add roles to the application:
- Description and display name can be chosen freely.
- Set the role name from the AEB application as the value.
- Generate a unique ID (in a GUID generator, for example).

Proceed as follows to add users or groups to the new roles:
- Open Azure Services – Azure Active Directory.
- Under Enterprise applications, select the appropriate application.
- Under Users and groups, click +Add user to select the users or groups you want.
- Use Select a role to assign the roles defined earlier.
Option 2
- This option is relevant if you opted for Creating roles and rights for single sign-on (SSO).
If you wish to map groups from your Azure Active Directory (see also Creating roles and rights for single sign-on (SSO)), you must emit them in the token. This is the only way to enable automatic role assignment in AEB applications.
- AEB does not recommend this emission approach, because it is very inflexible: The group ID must be shared with AEB during the configuration phase, meaning that AEB needs to intervene for each adjustment.
Proceed as follows to assign roles to the groups:
- Open Azure Services – Azure Active Directory.
- Under App Registrations, select the appropriate application.
- Under Token configuration, click + Add groups claim to open the Editor.
- Select the desired configuration, then click Add to confirm.
- AEB recommends that you only emit defined group memberships with the Groups assigned to the application setting. There is no need to modify the token. The “Group ID” is emitted by default.
- Under Customize token properties by type, check the Edit groups as role claims box to emit the groups as roles.
Proceed as follows to finally assign groups to the enterprise applications:
- Open Azure Services – Azure Active Directory.
- Under Enterprise applications, select the appropriate application.
- Under Users and groups, click +Add user to select the users or groups you want.
- If under Creating roles and rights for single sign-on (SSO) you set User assignment required? to Yes, that affects these groups as well.

Comments
0 comments
Please sign in to leave a comment.