You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ROOT/pages/tutorial/tutorial-sso-configuration.adoc
+13-5Lines changed: 13 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -133,20 +133,28 @@ image::sso-configuration-tutorials/okta-sign-on-tab.svg[title="Okta's sign-on ta
133
133
This example shows how to configure Entra ID for authentication and authorization using an access token.
134
134
135
135
. After the successful creation of your SSO application in Azure, open the *Token configuration* tab to configure a token.
136
-
.. In the Manage section, click *Token configuration* and then *Add groups claim*.
136
+
.. Click *Add groups claim*.
137
137
.. Select *Security groups* to include in your access token.
138
138
.. Save your changes.
139
139
140
-
. Next step is to open the **Expose an API** tab and click the **Add a Scope** button.
141
-
.. If you click the **Add a Scope** button for the first time, you see a new window stating that you need to add an _Application ID URI_ before proceeding.
140
+
. Open the **Expose an API** tab and select **Add a Scope**.
141
+
.. If you click the **Add a Scope** button for the first time, you see a new pane stating that you need to add an _Application ID URI_ before proceeding.
142
+
+
142
143
You can find it on your app *Overview* page.
143
144
+
144
145
.The GUID is used to identify specific resources or instances within Azure. You can find it on the app registration page.
145
146
image::sso-configuration-tutorials/azure-id.svg[]
146
147
+
148
+
Click *Save and continue* after setting the _Application ID URI_.
149
+
150
+
. Fill in all mandatory fields in the pane **Add a scope** and make a note of them.
151
+
.. Enter a new *Scope name*, *Admin consent display name*, and *Admin consent description*.
152
+
.. Make sure the *Enabled* scope state is selected.
153
+
.. Select the *Add scope* button to create the scope.
154
+
+
155
+
Repeat the previous two steps to add all scopes supported by your API.
156
+
Once the scopes are created, make a note of them for use later.
147
157
148
-
.. Fill in all mandatory fields in the window **Add a scope** and make a note of them.
149
-
.. Click *Save and continue*.
150
158
. Configure Neo4j to use Entra ID for authentication by configuring the following settings in the _neo4j.conf_ file:
0 commit comments