Active Directory & SSO Setup

This page descibes how to configure Azure Active Directory to autenticate your Paze.Industries platform and how to add new users after initial setup.

Setup Azure Active Directory for Paze.Industries

  1. 1.
    Navigate to your Azure portal (eg. Microsoft Azure )
  2. 2.
    In the portal, navigate to App registrations
  1. 3.
    Click on New registration
  2. 4.
    Fill in the input fields as follows:
  • Name: “Paze.Industries IIoT Platform” (you can decide how you want to name it in your organization)
  • Supported account types: Single-tenant
  • Redirect URI: Leave empty for now
  1. 5.
    Click “Register
  2. 6.
    In the next screen note down the “Application (client) ID" as well as the "Directory (tenant) ID" and send this information to your Customer Success contact at Paze.Industries.
  1. 7.
    On the same screen, click on Add a Redirect URI
  2. 8.
    In the next screen, click on Add a platform and select Web as your platform
  1. 9.
    In the next screen fill in the form as follows
  • Redirect URIs: The URI of your Paze.Industries application + some redirect path. Enter https://[yourPazeDomain].paze.industries/signin-oidc/[yourtenant]
  • Front-channel logout URL: Leave empty
  • Tick Access tokens and ID tokens (important!)
  1. 10.
    Click on “Configure”.
  2. 11.
    In the next screen, click on “Add URI” and enter your backend-redirect URL. Click on “Save” to finalize.
The URI to enter is of the following format: https://[yourbackend].paze.industries/signin-oidc/[yourtenant]. You can find the [yourbackend] URL by navigating to your Paze.Industries application’s login screen in the browser. The URL which is shown during login is your [yourbackend]. In the example below, [yourbackend] equals “galaxyapi”.
  1. 12.
    Inform Paze.Industries, that you’ve registered Paze.Industries as an AD application. Please also provide the ClientId and TenantId as described in some steps earlier.
  2. 13.
    After Paze.Industries activates the integration, one of your Azure AD admins needs to navigate to the Paze.Industries applications and log in. The very first time a tenant logs in to Paze.Industries with an Azure Active Directory user, you need to grant admin consent to the application.
  3. 14.
    Navigate to your Paze.Industries application. Now your login screen provides another login option. Click on the blue external login button:
  1. 15.
    Log in with one of your Azure Active Directory users and grant the permissions, as shown below. Make sure to “Consent on behalf of your organization”, so that other users are now able to log in without that screen pops up.
Congratulations, your Azure Active Directory integration is ready to be used by your organization's users.

Assign Paze.Industries groups to external Active Directory users or AD groups

Users who log in with Azure Active Directory don’t have any permissions in the Paze.Industries application by default. To add permissions, they need to be assigned to a Paze.Industries group. To ease up the workflow, the assignment between users and groups is done in Azure Active Directory.
To set it up you have to follow the steps as described:
  1. 1.
    Create a Paze.Industries group and assign permissions (as with “classic” Paze.Industries user management)
  2. 2.
    Make a note of the group ID - open the group in the Paze.Industries app and look at the URL - the GUID at the end is the group ID (highlighted in red in the screenshot).
  1. 3.
    Navigate to your Azure Portal, to “App registrations” and open your “Paze.Industries IIoT Platform” registered app, and click on “Create app role”. In the next Screen fill out the input forms as follows.
  • Display name: Azure Active Directory visible name of this app role - can be defined on your own.
  • Allowed member types: Users/Groups
  • Value: Needs to be “senseforce.[Paze.Industries group id]” (with the group id being found in the step above). Example: senseforce.108f08e1-7bdb-4397-854c-093790f52722
  • Description: Any description helping you to manage your app roles.
  1. 4.
    Click “Apply”. Your app role is now created.
  2. 5.
    Repeat this step potentially for any of your Paze.Industries groups. Note: This step only needs to be done once per Paze.Industries group.
  3. 6.
    In your Azure portal, navigate to Enterprise Applications.
  1. 7.
    Open your “Paze.Industries IIoT Platform” (Note: App registrations are automatically added as Enterprise Applications)
  2. 8.
    Click “Assign Users and Groups".
Tipp: Assigning individual users to app roles might be cumbersome. It is better practice to add a role assignment to an AD group. All users in this AD group will automatically inherit the groups roles, making adding new users very easy
  1. 9.
    In the next screen click “Add user/group”.
  2. 10.
    In the next screen select the user or AD group as well as the according to app role created in the steps before.
  3. 11.
    Click “Assign”. As a result, the selected user or group is assigned to this app role.
Tipp: You can add multiple app role assignments per user or group. So if you want a user to be assigned to multiple Paze.Industries groups, create multiple app roles and multiple enterprise user assignments

How to add new users after initial setup

Let’s assume, you added all your Paze.Industries groups as App roles as described above and furthermore, you created AD groups with the according to app roles, then adding new users is as follows:
  1. 1.
    Add a new Azure AD user
  2. 2.
    Add this user to one of your AD groups which have one or several app roles
The user is now able to log in and has permissions as defined with the app roles.
Info: There are 3 fields for the name in the Active Directory. The "Name", the "Family Name" and the "Given Name". Family Name and Given Name are mapped 1 to 1 into the corresponding Paze.Industries field. If only the "Name" is filled in, it will be mapped to the Family Name in Paze.Industries.

Other details

Forgot password
If an external user wants to engage in the forgot password flow, an error message is prevented.
External login button
If an Azure AD integration is configured, a new, blue, external login button is added.
Last modified 7mo ago