Setup Guide for Azure AD App

Step 1: Setup Azure Active Directory as OAuth Provider

  • Sign in to Azure portal.
  • In the left-hand navigation pane, click the Azure Active Directory service, click App registrations, and click New application registration.
  • centrify_3
  • When the Create page appears, enter your application's registration information:
  • Name : Name of your application.
    Application type :
    1. Select "Native" for client applications that are installed locally on a device. This setting is used for OAuth public native clients
    2. Select "Web app / API" for client applications and resource/API applications that are installed on a secure server. This setting is used for OAuth confidential web clients and public user-agent-based clients. The same application can also expose both a client and resource/API.
    Sign-on URL :
    1. For "Web app / API" applications, provide the base URL of your app. eg, https://<domain-name>/oauth/callback might be the URL for a web app running on your local machine. Users would use this URL to sign in to a web client application.
    2. For "Native" applications, provide the URI used by Azure AD to return token responses. Enter a value specific to your application.
      eg, https://localhost:8090
    centrify_11
  • When finished, click Create. Azure AD assigns a unique Application ID to your application. Copy Application ID, this will be your Client ID.
  • azure-ad-1
  • Click on Settings > Keys.
  • azure-ad-2
  • Enter description and expiration time. Click on Save option.
  • centrify_12
  • Copy value. This will be your Secret key.
  • azure-ad-3
  • Get Tenant ID : Click on Azure Active Directory > Properties. Copy Directory ID. This Directory ID will be your Tenant ID.
  • aruze-ad-4
  • Enter application Home page URL Logout Settings->Properties->Logout URL.