Configure Microsoft Azure as Identity Provider
This will allow you to use Microsoft Entra ID to log in to your ReARM instance. This tutorial is for ReARM Community Edition, if you are a user of ReARM Enterprise Edition, Reliza will work with you on the configuration.
Azure Part
You would need to create Azure Service Principal to register Microsoft as an identity provider. For this, in Azure Portal search, search for
App registrations
, click on it and once on theApp registrations
page, click on theNew registration
button.Choose a name for your Service Principal, opt for Single Tenancy - "Accounts in this organizational directory only" (default value) and click
Register
on the bottom.On the registered Service Principal page, note
Application (client) ID
andDirectory (tenant) ID
- you will need these values later.On the same page, under Client credentials click on the
Add a certificate or secret
. Then click on theNew client secret
. Enter desired secret description, i.e.ReARM Identity Provider Credential
, choose desired expiration timeframe and clickAdd
. On the next page, note created secret value - you will need it later.
ReARM Part
Login to Keycloak with your administrative account by adding /kauth path to your ReARM URI.
In Keycloak, select Reliza realm.
Open Identity providers section, and click (if exists) or add Microsoft.
Enter your Service Principal's Client ID as noted above.
Enter your Service Principal's Client Secret as noted above.
Enter your Service Principal's Tenant ID as noted above.
Click "Save"
You should now be able to login to ReARM using your Microsoft identities.