Azure AD via OIDC
Prerequisites
You must have an Aerofiler subscription that supports Azure AD integration and Aerofiler Support must have enabled Azure AD integration for your Account
Setup Steps
Go to “Azure Active Directory”
In the Overview section, copy the Tenant ID (used later).
Go to “App Registrations” (left menu)
Click “New registration” at the top
For “Name”, enter “Aerofiler”
In “Supported account types” select the most suitable for your organization which is most likely “Accounts in this organizational directory only” (“Single tenant”)
For “Redirect URI” enter the Redirect URL provided by Aerofiler. Typically this is in the form https://acme.aerofiler.com/auth/msal/callback or https://acme.aerofiler.com.au/auth/msal/ callback, where
acme
is your Aerofiler sitename.Click “Register” (bottom)
Copy the “Application (client) ID” value for later
Click “Add a certificate or secret”, near “Client credentials” (top right)
In the “Client secrets” area, click “New client secret”
Enter a relevant description and choose a suitable “Expires” value
Click “Add” (bottom)
Copy the value in the “Value” column. This is the Client Secret.
Send the following information to Aerofiler in a text file via the secure link provided by Aerofiler:
Tenant ID: [from step 2]
Client (Application) ID: [from step 9]
Client Secret: [from step 14]
Once the above is completed, Aerofiler may need to send you a link that needs to be clicked on to authorise the application within Azure AD.
Depending on chosen expiry period, a new Client Secret for this connection will need to be generated and given to Aerofiler before the current one expires, otherwise login through SSO will stop working.
Last updated