You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/openshift/configure-azure-ad-ui.md
-10Lines changed: 0 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,12 +40,8 @@ Provide a name for the application, for example **aro-azuread-auth**, and fill i
40
40
41
41
Navigate to **Certificates & secrets** and click on **New client secret** and fill in the details. Make note of the key value, as you'll use it in a later stage. You won't be able to retrieve it again.
42
42
43
-

44
-
45
43
Navigate to the **Overview** and make note of the **Application (client) ID** and **Directory (tenant) ID**. You'll need them in a later stage.
46
44
47
-

48
-
49
45
## Configure optional claims
50
46
51
47
Application developers can use [optional claims](../active-directory/develop/active-directory-optional-claims.md) in their Microsoft Entra applications to specify which claims they want in tokens sent to their application.
@@ -60,8 +56,6 @@ We'll configure OpenShift to use the `email` claim and fall back to `upn` to set
60
56
61
57
Navigate to **Token configuration** and click on **Add optional claim**. Select **ID** then check the **email** and **upn** claims.
62
58
63
-

64
-
65
59
## Assign users and groups to the cluster (optional)
66
60
67
61
Applications registered in a Microsoft Entra tenant are, by default, available to all users of the tenant who authenticate successfully. Microsoft Entra ID allows tenant administrators and developers to restrict an app to a specific set of users or security groups in the tenant.
@@ -105,12 +99,8 @@ Scroll down to select **Add** under **Identity Providers** and select **OpenID C
105
99
106
100
Fill in the name as **Microsoft Entra ID**, the **Client ID** as the **Application ID** and the **Client Secret**. The **Issuer URL** is formatted as such: `https://login.microsoftonline.com/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/v2.0`. Replace the placeholder with the Tenant ID you retrieved earlier.
107
101
108
-

109
-
110
102
Scroll down to the **Claims** section and update the **Preferred Username** to use the value from the **upn** claim.
111
103
112
-

Launch the console URL in a browser and login using the `kubeadmin` credentials.
63
63
64
-
:::image type="content" source="media/login.png" alt-text="Azure Red Hat OpenShift login screen":::
65
-
66
64
Switch to the *Developer* perspective instead of the *Administrator* perspective in the left-hand side menu and select `demoproject` in the list of projects. You should then be at the *Topology* page for the project.
67
65
68
66
:::image type="content" source="media/s2i/project-topology.png" alt-text="Azure Red Hat OpenShift project topology":::
Open a web browser and open the console URL. Log in using `kubeadmin` credentials.
59
59
60
-
:::image type="content" source="media/login.png" alt-text="A screenshot that shows the Azure Red Hat OpenShift log-in screen":::
61
-
62
60
## Install the OpenShift Serverless operator
63
61
64
62
When you're logged into the OpenShift web console, confirm that you're in *Administrator* view. Open the *Operator Hub* and select the **OpenShift Serverless** operator.
0 commit comments