You can use Azure Active Directory (Azure AD) as your identity provider.
- Create an Azure AD App Registration:
Note: The following steps are a broad description of a
sample configuration. For more detailed instructions, refer to the
Microsoft documentation for configuring AAD as an authentication provider.
- Log in to the Azure portal as an administrator, go to App Registrations , and select New Registration.
- In the Register an application page, fill in the Name field with a name for
Automation Suite
.
- In the Supported account types section, select Accounts in this organizational directory only.
- Set the Redirect URI by selecting Web from the drop-down list and filling in the Identity base URL, plus the suffix
/azure-signin-oidc
. For example, https://{yourDomain}/{organizationName}/identity_
/azure-signin-oidc
.
- At the bottom, select the ID tokens checkbox.
- Select Register to register
Automation Suite
.
- Save the Application (Client) ID for later.
- Configure Azure AD SSO:
- Log in to the
host portal
as a system administrator.
- Make sure that Host is selected at the top of the left pane and then select Security.
- Under Azure AD SSO, select Configure.
- Select the Force automatic login using this provider checkbox if you want to only allow login with Azure Active Directory accounts.
- In the Display Name field, type the text you want to show under this login option on the Login page.
- In the Client ID field, paste the value of the Application (Client) ID obtained from the Azure portal.
- (Optional) In the Client Secret field, paste the value obtained from the Azure portal.
-
Set the Authority parameter to one of the following values:
-
https://login.microsoftonline.com/<tenant>
, where <tenant> is the tenant ID of the Azure AD tenant or a domain associated with this Azure AD tenant. Used only to sign
in users of a specific organization.
-
https://login.microsoftonline.com/common
. Used to sign in users with work and school accounts or personal Microsoft accounts.
- (Optional) In the Logout URL, paste the value obtained from the Azure portal.
- Select Save to save the configuration and return to the previous page.
- Select the toggle to the left of Azure AD SSO to enable the integration.
- Restart the identity-service-api-* pod. This is required after making any changes to external providers.
-
Connect to your Automation Suite cluster.
-
Run the following command: kubectl -n uipath rollout restart deployment identity-service-api
- Allow Azure AD SSO for the organization:
Now that Automation Suite is integrated with Azure AD Sign-In, user accounts that have a valid Azure AD email address can
use the Azure AD SSO option on the Login page to sign in to Automation Suite.
Each organization administrator must do this for their organization if they want to allow login with Azure AD SSO.
- Log in to
Automation Suite
as an organization administrator.
- Add user accounts, each with a valid Azure AD email address.