简介
This page describes how to set up Single Sign-on through Microsoft Azure Active Directory.
If Single Sign-On through Azure Active Directory is enabled and correctly configured, a button is displayed at the bottom of the Login page. See the illustration below.


Step 1: Configure Azure Active Directory to recognize a UiPath Process Mining instance.
注意
For a detailed description on how to set up Azure Active Directory authentication, visit the official Microsoft Documentation.
Follow these steps to register and configure your app in the Microsoft Azure Portal.
Step | Action |
---|---|
1 | Go to the Microsoft Azure App Registrations page and click New Registration. |
2 | • In the Register an application page, fill the Name field with the desired name of your Uipath Process Mining instance. |
3 | Locate the app in the applications list. Click on the app to open the settings page. |
4 | Click on Authentication in the Manage menu. |
5 | Click on Token configuration in the Manage menu. |
6 | Click on API permissions in the Manage menu. |
Step 2: Configure UiPath Process Mining for Single Sign-On
Configure Server settings
- Go to the Settings tab of the Superadmin page of your UiPath Process Mining installation. See illustration below.


- Add the required Azure AD settings in the
ExternalAuthenticationProviders
setting of the Server Settings. Below is a description of the JSON keys of theazureAD
object.
Key | Description | Mandatory |
---|---|---|
clientIdentifier | The Application (client) ID as displayed in the Essentials section on the app Overview page in Microsoft Azure Portal. See illustration below. | Yes |
tenant | The Directory (tenant) ID as displayed in the Essentials section on the app Overview page in Microsoft Azure Portal. | Yes |
loggingLevel | Enables you to specify whether you want to add information regarding the login process to the log in the | No |
See illustration below for an example of the Server Settings with the ExternalAuthenticationProviders
setting with the azureAD
object.
, "ExternalAuthenticationProviders": {
"azureAd": {
"clientIdentifier": "d1a1d0f4-ce09-4232-91b9-7756d613b78a"
, "tenant": "f636b271-d616-44d1-bb23-43a73b6eb571"
}
}
-
Click on SAVE to save the new settings.
-
Press F5 to refresh the Superadmin page. This loads the new settings and enables Azure AD groups to be created based on these settings.
自动登录
重要
Make sure Single Sign-on works correctly before enabling autologin. Enabling autologin when SSO is not set up correctly can make it impossible for users affected by the autologin setting to log in.
With the AutoLogin
Server Setting, the user will be automatically logged in using the current active SSO method.
By default, AutoLogin
is set to none
. If you want to enable auto-login for end-users and/or Superadmin users, you can specify this in the AutoLogin
in the Superadmin Settings tab. See The Settings Tab.
注意
通过本地主机登录时,系统始终会为超级管理员用户禁用自动登录。
Additional steps
In order to use Integrated Azure Active Directory authentication, you must create one or more AD groups to allow members to login. For Superadmin users, or app developers you can create AD groups on the Superadmin users tab. See Adding Superadmin AD Groups.
For end-user authentication, AD groups can be created on the End user administration page. See Adding End-user AD Groups.
8 个月前更新