-
Notifications
You must be signed in to change notification settings - Fork 7
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
docs: Add OIDC sections for add-ons components
- Loading branch information
1 parent
9af6365
commit 1d48b03
Showing
96 changed files
with
1,726 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+145 KB
docs/assets/operator-guide/microsoft-entra-auth/argocd-api-permissions.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+46.7 KB
docs/assets/operator-guide/microsoft-entra-auth/argocd-application-data.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+164 KB
docs/assets/operator-guide/microsoft-entra-auth/argocd-authentication-settings.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+124 KB
docs/assets/operator-guide/microsoft-entra-auth/argocd-client-secret.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+123 KB
docs/assets/operator-guide/microsoft-entra-auth/argocd-client-secrets.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+54.5 KB
docs/assets/operator-guide/microsoft-entra-auth/argocd-group-object-id.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+145 KB
docs/assets/operator-guide/microsoft-entra-auth/argocd-redirect-uri.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+163 KB
docs/assets/operator-guide/microsoft-entra-auth/argocd-token-configuration-2.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+146 KB
docs/assets/operator-guide/microsoft-entra-auth/argocd-token-configuration.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+154 KB
docs/assets/operator-guide/microsoft-entra-auth/authentication-settings.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+138 KB
docs/assets/operator-guide/microsoft-entra-auth/awx-api-permissions.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+124 KB
docs/assets/operator-guide/microsoft-entra-auth/awx-client-secrets.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+67.5 KB
docs/assets/operator-guide/microsoft-entra-auth/awx-entra-settings.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+141 KB
docs/assets/operator-guide/microsoft-entra-auth/defectdojo-api-permissions.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+36.1 KB
docs/assets/operator-guide/microsoft-entra-auth/defectdojo-application-data.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+127 KB
docs/assets/operator-guide/microsoft-entra-auth/defectdojo-client-secret.png
Oops, something went wrong.
Binary file added
BIN
+125 KB
docs/assets/operator-guide/microsoft-entra-auth/defectdojo-client-secrets.png
Oops, something went wrong.
Oops, something went wrong.
Binary file added
BIN
+149 KB
docs/assets/operator-guide/microsoft-entra-auth/defectdojo-redirect-uri.png
Oops, something went wrong.
Binary file added
BIN
+136 KB
docs/assets/operator-guide/microsoft-entra-auth/deptrack-api-permissions.png
Oops, something went wrong.
Binary file added
BIN
+47.9 KB
docs/assets/operator-guide/microsoft-entra-auth/deptrack-application-data.png
Oops, something went wrong.
Binary file added
BIN
+156 KB
...assets/operator-guide/microsoft-entra-auth/deptrack-authentication-settings.png
Oops, something went wrong.
Oops, something went wrong.
Oops, something went wrong.
Binary file added
BIN
+143 KB
docs/assets/operator-guide/microsoft-entra-auth/deptrack-redirect-uri.png
Oops, something went wrong.
Binary file added
BIN
+110 KB
docs/assets/operator-guide/microsoft-entra-auth/deptrack-register-application.png
Oops, something went wrong.
Oops, something went wrong.
Binary file added
BIN
+139 KB
docs/assets/operator-guide/microsoft-entra-auth/deptrack-token-configuration.png
Oops, something went wrong.
Binary file added
BIN
+135 KB
docs/assets/operator-guide/microsoft-entra-auth/grafana-api-permissions.png
Oops, something went wrong.
Binary file added
BIN
+47.8 KB
docs/assets/operator-guide/microsoft-entra-auth/grafana-application-data.png
Oops, something went wrong.
Binary file added
BIN
+155 KB
.../assets/operator-guide/microsoft-entra-auth/grafana-authentication-settings.png
Oops, something went wrong.
Binary file added
BIN
+118 KB
docs/assets/operator-guide/microsoft-entra-auth/grafana-client-secret.png
Oops, something went wrong.
Binary file added
BIN
+124 KB
docs/assets/operator-guide/microsoft-entra-auth/grafana-client-secrets.png
Oops, something went wrong.
Oops, something went wrong.
Binary file added
BIN
+166 KB
docs/assets/operator-guide/microsoft-entra-auth/grafana-token-configuration-2.png
Oops, something went wrong.
Binary file added
BIN
+150 KB
docs/assets/operator-guide/microsoft-entra-auth/grafana-token-configuration.png
Oops, something went wrong.
Oops, something went wrong.
Binary file added
BIN
+155 KB
docs/assets/operator-guide/microsoft-entra-auth/harbor-api-permissions.png
Oops, something went wrong.
Binary file added
BIN
+54 KB
docs/assets/operator-guide/microsoft-entra-auth/harbor-application-data.png
Oops, something went wrong.
Binary file added
BIN
+121 KB
docs/assets/operator-guide/microsoft-entra-auth/harbor-client-secret.png
Oops, something went wrong.
Binary file added
BIN
+120 KB
docs/assets/operator-guide/microsoft-entra-auth/harbor-client-secrets.png
Oops, something went wrong.
Binary file added
BIN
+141 KB
docs/assets/operator-guide/microsoft-entra-auth/harbor-configuration.png
Oops, something went wrong.
Oops, something went wrong.
Binary file added
BIN
+137 KB
docs/assets/operator-guide/microsoft-entra-auth/harbor-token-configuration.png
Oops, something went wrong.
Oops, something went wrong.
Binary file added
BIN
+170 KB
docs/assets/operator-guide/microsoft-entra-auth/microsoft-entra-admin-center.png
Oops, something went wrong.
Oops, something went wrong.
Oops, something went wrong.
Binary file added
BIN
+156 KB
docs/assets/operator-guide/microsoft-entra-auth/nexus-api-permissions.png
Oops, something went wrong.
Binary file added
BIN
+165 KB
docs/assets/operator-guide/microsoft-entra-auth/nexus-authentication-settings.png
Oops, something went wrong.
Binary file added
BIN
+121 KB
docs/assets/operator-guide/microsoft-entra-auth/nexus-client-secret.png
Oops, something went wrong.
Binary file added
BIN
+121 KB
docs/assets/operator-guide/microsoft-entra-auth/nexus-client-secrets.png
Oops, something went wrong.
Binary file added
BIN
+199 KB
docs/assets/operator-guide/microsoft-entra-auth/nexus-token-configuration.png
Oops, something went wrong.
Binary file added
BIN
+147 KB
docs/assets/operator-guide/microsoft-entra-auth/oauth2-proxy-api-permissions.png
Oops, something went wrong.
Binary file added
BIN
+55.3 KB
docs/assets/operator-guide/microsoft-entra-auth/oauth2-proxy-application-data.png
Oops, something went wrong.
Binary file added
BIN
+124 KB
docs/assets/operator-guide/microsoft-entra-auth/oauth2-proxy-client-secret.png
Oops, something went wrong.
Binary file added
BIN
+124 KB
docs/assets/operator-guide/microsoft-entra-auth/oauth2-proxy-client-secrets.png
Oops, something went wrong.
Binary file added
BIN
+44.3 KB
docs/assets/operator-guide/microsoft-entra-auth/oauth2-proxy-group-object-id.png
Oops, something went wrong.
Binary file added
BIN
+139 KB
...assets/operator-guide/microsoft-entra-auth/oauth2-proxy-token-configuration.png
Oops, something went wrong.
Binary file added
BIN
+132 KB
docs/assets/operator-guide/microsoft-entra-auth/opensearch-api-permissions.png
Oops, something went wrong.
Binary file added
BIN
+49.1 KB
docs/assets/operator-guide/microsoft-entra-auth/opensearch-application-data.png
Oops, something went wrong.
Binary file added
BIN
+156 KB
...sets/operator-guide/microsoft-entra-auth/opensearch-authentication-settings.png
Oops, something went wrong.
Binary file added
BIN
+125 KB
docs/assets/operator-guide/microsoft-entra-auth/opensearch-client-secret.png
Oops, something went wrong.
Binary file added
BIN
+124 KB
docs/assets/operator-guide/microsoft-entra-auth/opensearch-client-secrets.png
Oops, something went wrong.
Oops, something went wrong.
Binary file added
BIN
+147 KB
docs/assets/operator-guide/microsoft-entra-auth/opensearch-redirect-uri.png
Oops, something went wrong.
Binary file added
BIN
+139 KB
docs/assets/operator-guide/microsoft-entra-auth/opensearch-token-configuration.png
Oops, something went wrong.
Binary file added
BIN
+107 KB
docs/assets/operator-guide/microsoft-entra-auth/register-application.png
Oops, something went wrong.
Oops, something went wrong.
Oops, something went wrong.
Binary file added
BIN
+115 KB
docs/assets/operator-guide/microsoft-entra-auth/tekton-dashboard-login.png
Oops, something went wrong.
Binary file added
BIN
+234 KB
docs/assets/operator-guide/microsoft-entra-auth/token-configuration-2.png
Oops, something went wrong.
Binary file added
BIN
+203 KB
docs/assets/operator-guide/microsoft-entra-auth/token-configuration.png
Oops, something went wrong.
181 changes: 181 additions & 0 deletions
181
docs/operator-guide/microsoft-entra/argo-cd-authentication.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,181 @@ | ||
# Argo CD | ||
|
||
This section provides instructions on how to configure OIDC authentication for the Argo CD using Microsoft Entra as the Identity Provider. | ||
|
||
## Prerequisites | ||
|
||
- Access to the [Microsoft Entra Admin Center](https://entra.microsoft.com/?feature.msaljs=true#home) with administrative privileges. | ||
- Created Microsoft Entra Tenant. | ||
- Installed Argo CD (can be installed during **Configuring Helm chart** step). | ||
- Fork copy of the [edp-cluster-add-ons](https://github.com/epam/edp-cluster-add-ons) repository. | ||
- (Optional) Installed External Secrets Operator. | ||
|
||
## Configuring Microsoft Entra Application | ||
|
||
To configure Microsoft Entra as the Identity Provider for the Argo CD, it is necessary to create and configure an Application in the Microsoft Entra Admin Center. | ||
|
||
1. Log in to the [Microsoft Entra Admin Center](https://entra.microsoft.com/?feature.msaljs=true#home). | ||
|
||
![Microsoft Entra Admin Center](../../assets/operator-guide/microsoft-entra-auth/microsoft-entra-admin-center.png) | ||
|
||
2. In the left sidebar menu, select **Applications** and click **App registrations**. | ||
|
||
![App registrations](../../assets/operator-guide/microsoft-entra-auth/app-registrations.png) | ||
|
||
3. Click on the **New registration** button. | ||
|
||
![New registration](../../assets/operator-guide/microsoft-entra-auth/new-registration.png) | ||
|
||
4. Fill in the required fields, such as **Name**, **Supported account types** and **Redirect URI** (You can skip setting the **Redirect URI** if you don't deploy Argo CD yet). Click **Register** to create the application. | ||
|
||
:::note | ||
The **Redirect URI** should be in the format `https://<Argo CD URL>/auth/callback`. | ||
::: | ||
|
||
![Register application](../../assets/operator-guide/microsoft-entra-auth/register-application.png) | ||
|
||
5. In the created application, navigate to the **Authentication** section from the left sidebar menu. In the **Implicit grant and hybrid flows** section, select **ID tokens** for the token type. In the **Allow public client flows** section, set the value to **No**. | ||
|
||
![Authentication settings](../../assets/operator-guide/microsoft-entra-auth/argocd-authentication-settings.png) | ||
|
||
6. Navigate to the **Certificates & secrets** section. In the **Client secrets** tab, click on the **New client secret** button to create a new secret. Fill in the required fields and click **Add**. | ||
|
||
![Client secrets](../../assets/operator-guide/microsoft-entra-auth/argocd-client-secrets.png) | ||
|
||
7. Copy the generated client secret value and store it securely. You will need this value to configure the Argo CD Helm chart. | ||
|
||
![Client secret](../../assets/operator-guide/microsoft-entra-auth/argocd-client-secret.png) | ||
|
||
8. Navigate to the **Token configuration** section and click on **Add group claim** button. Choose the group type as **Security Groups** and for the ID token type, select **Group ID**. | ||
|
||
![Token configuration](../../assets/operator-guide/microsoft-entra-auth/argocd-token-configuration.png) | ||
|
||
Also, add the **preferred_username** and **email** optional claims. | ||
|
||
![Token configuration](../../assets/operator-guide/microsoft-entra-auth/argocd-token-configuration-2.png) | ||
|
||
9. Navigate to the **API permissions** section. Click on the **Add a permission** button. Select **Microsoft Graph** and then **Delegated permissions**. Add the following permissions: | ||
|
||
- **email** | ||
- **openid** | ||
- **profile** | ||
- **User.Read** | ||
|
||
![API permissions](../../assets/operator-guide/microsoft-entra-auth/argocd-api-permissions.png) | ||
|
||
After adding the permissions, click on the **Grant admin consent for 'Tenant name'** button to grant the required permissions. | ||
|
||
## Creating the Groups | ||
|
||
To manage access to the Argo CD, it is necessary to create groups in the Microsoft Entra Admin Center and assign users to them. | ||
|
||
1. In the Microsoft Entra Admin Center, in the left sidebar menu, select **Groups** and then **All groups**. Click on **New group** button to create a new group(s) for users who will have access to Argo CD (e.g., `ArgoCDAdmins`, `ArgoCDReadOnly`, etc.). | ||
|
||
![New group](../../assets/operator-guide/microsoft-entra-auth/new-group.png) | ||
|
||
2. Fill in the required fields, such as **Groups type** and **Group name**. In the **Members** section, add users who will be part of the group. | ||
|
||
![Create group](../../assets/operator-guide/microsoft-entra-auth/create-group.png) | ||
|
||
3. Click on the **Create** button and repeat this process for each required group. | ||
|
||
## Configuring Argo CD Helm chart | ||
|
||
To integrate Argo CD with configured Microsoft Entra Application, it is necessary to configure the Argo CD Helm chart. In this example, we will use the [edp-cluster-add-ons](https://github.com/epam/edp-cluster-add-ons) repository to deploy Argo CD to the Kubernetes (e.g. AWS EKS) cluster. | ||
|
||
:::note | ||
The Application data, such as **Application (client) ID** and **Directory (tenant) ID**, can be found in the **Overview** section of the Application in the Microsoft Entra Admin Center. | ||
![Application data](../../assets/operator-guide/microsoft-entra-auth/argocd-application-data.png) | ||
::: | ||
|
||
:::note | ||
The **Object ID** can be found in the **Overview** section of the group in the Microsoft Entra Admin Center. | ||
![Group Object ID](../../assets/operator-guide/microsoft-entra-auth/argocd-group-object-id.png) | ||
::: | ||
|
||
1. Navigate to the forked [Cluster Add-Ons repository](https://github.com/epam/edp-cluster-add-ons) and locate the `values.yaml` file in the `argo-cd` directory. | ||
|
||
Update the `values.yaml` file with the following values: | ||
|
||
```yaml title="argo-cd/values.yaml" | ||
argo-cd: | ||
configs: | ||
cm: | ||
url: "https://<Argo CD URL>" | ||
application.instanceLabelKey: argocd.argoproj.io/instance-edp | ||
exec.enabled: true | ||
oidc.config: | | ||
name: Entra | ||
issuer: https://login.microsoftonline.com/<Directory (tenant) ID>/v2.0 | ||
clientID: <Application (client) ID> | ||
clientSecret: $keycloak-client-argocd-secret:clientSecret | ||
requestedIDTokenClaims: | ||
groups: | ||
essential: true | ||
value: "SecurityGroup" | ||
requestedScopes: | ||
- openid | ||
- profile | ||
rbac: | ||
scopes: '[groups, email]' | ||
policy.csv: | | ||
# default global admins | ||
g, "<Object ID of ArgoCDAdmins group>", role:admin | ||
# Default global developers | ||
g, "<Object ID of ArgoCDReadOnly group>", role:readonly | ||
``` | ||
Replace the following placeholders with the actual values: | ||
- `<Argo CD URL>` - Endpoint of the Argo CD. | ||
- `<Directory (tenant) ID>` - Directory (tenant) ID of the Microsoft Entra Tenant. | ||
- `<Application (client) ID>` - Application (client) ID from the Microsoft Entra Application settings. | ||
- `<Object ID of ArgoCDAdmins group>` - Object ID of the **ArgoCDAdmins** group created in the Microsoft Entra Admin Center. | ||
- `<Object ID of ArgoCDReadOnly group>` - Object ID of the **ArgoCDReadOnly** group created in the Microsoft Entra Admin Center. | ||
|
||
2. Update or create the `keycloak-client-argocd-secret` secret with the Application Client Secret value. | ||
|
||
- Using External Secrets Operator | ||
|
||
Be sure to update the AWS Parameter Store object path specified in the `argo-cd/values.yaml` file in the `eso.secretName` field with the Application Client Secret value. | ||
|
||
```json title="AWS Parameter Store object" | ||
{ | ||
"clientSecret": "<Application Client secret>" | ||
} | ||
``` | ||
|
||
- Manual approach | ||
|
||
Create the `keycloak-client-argocd-secret` secret manually using the following template: | ||
|
||
```yaml title="keycloak-client-argocd-secret.yaml" | ||
apiVersion: v1 | ||
kind: Secret | ||
metadata: | ||
name: keycloak-client-argocd-secret | ||
namespace: argocd | ||
data: | ||
clientSecret: <Application Client secret> | ||
``` | ||
|
||
3. After updating the `values.yaml` file, commit the changes to the repository and apply the changes with Helm or Argo CD. | ||
|
||
4. Navigate to the Microsoft Entra Application and add the **Redirect URI** in the **Authentication** section if you haven't done it before. | ||
|
||
:::note | ||
The **Redirect URI** should be in the format `https://<Argo CD URL>/auth/callback`. | ||
::: | ||
|
||
![Redirect URI](../../assets/operator-guide/microsoft-entra-auth/argocd-redirect-uri.png) | ||
|
||
5. Verify that the OIDC authentication is configured correctly by logging in to Argo CD using the **Log in via Entra** option. | ||
|
||
![Argo CD login](../../assets/operator-guide/microsoft-entra-auth/argocd-login.png) | ||
|
||
After completing these steps, the Argo CD will be configured to use Microsoft Entra as the Identity Provider for authentication. Users will be able to log in to the Argo CD using their Microsoft Entra credentials. | ||
|
||
## Related Articles | ||
|
||
- [OpenID Connect Authentication Overview](./oidc-authentication-overview.md) |
76 changes: 76 additions & 0 deletions
76
docs/operator-guide/microsoft-entra/awx-operator-authentication.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,76 @@ | ||
# Ansible AWX | ||
|
||
This section provides instructions on how to configure OIDC authentication for the Ansible AWX using Microsoft Entra as the Identity Provider. | ||
|
||
## Prerequisites | ||
|
||
- Access to the [Microsoft Entra Admin Center](https://entra.microsoft.com/?feature.msaljs=true#home) with administrative privileges. | ||
- Created Microsoft Entra Tenant. | ||
- Installed Ansible AWX using the [AWX Operator](https://github.com/ansible-community/awx-operator-helm). | ||
|
||
## Configuring Microsoft Entra Application | ||
|
||
To configure Microsoft Entra as the Identity Provider for the Ansible AWX, it is necessary to create and configure an Application in the Microsoft Entra Admin Center. | ||
|
||
1. Log in to the [Microsoft Entra Admin Center](https://entra.microsoft.com/?feature.msaljs=true#home). | ||
|
||
![Microsoft Entra Admin Center](../../assets/operator-guide/microsoft-entra-auth/microsoft-entra-admin-center.png) | ||
|
||
2. In the left sidebar menu, select **Applications** and click **App registrations**. | ||
|
||
![App registrations](../../assets/operator-guide/microsoft-entra-auth/app-registrations.png) | ||
|
||
3. Click on the **New registration** button. | ||
|
||
![New registration](../../assets/operator-guide/microsoft-entra-auth/new-registration.png) | ||
|
||
4. Fill in the required fields, such as **Name**, **Supported account types** and **Redirect URI**. Click **Register** to create the application. | ||
|
||
:::note | ||
The **Redirect URI** should be in the format `https://<Ansible AWX URL>/sso/complete/azuread-oauth2/`. | ||
::: | ||
|
||
![Register application](../../assets/operator-guide/microsoft-entra-auth/register-application.png) | ||
|
||
5. In the created application, navigate to the **Certificates & secrets** section from the left sidebar menu. In the **Client secrets** tab, click on the **New client secret** button to create a new secret. Fill in the required fields and click **Add**. | ||
|
||
![Client secrets](../../assets/operator-guide/microsoft-entra-auth/awx-client-secrets.png) | ||
|
||
6. Copy the generated Client secret value and store it securely. | ||
|
||
![Client secret](../../assets/operator-guide/microsoft-entra-auth/awx-client-secret.png) | ||
|
||
7. Navigate to the **API permissions** section. Ensure that the **User.Read** permission is added under the **Microsoft Graph** API. If not, click on the **Add a permission** button, select **Microsoft Graph**, and add the **User.Read** permission. After adding the permission, click on the **Grant admin consent for 'Tenant name'** button to grant the required permissions. | ||
|
||
![API permissions](../../assets/operator-guide/microsoft-entra-auth/awx-api-permissions.png) | ||
|
||
## Configuring Ansible AWX | ||
|
||
To integrate Ansible AWX with the configured Microsoft Entra Application, it is necessary to configure the Ansible AWX to use OIDC authentication. | ||
|
||
1. Open the Ansible AWX web interface and log in as an administrator. | ||
|
||
![AWX Login](../../assets/operator-guide/microsoft-entra-auth/awx-login.png) | ||
|
||
2. In the left sidebar menu, navigate to **Settings** section. In the **Authentication** tab, click on the **Azure AD settings**. | ||
|
||
![AWX Settings](../../assets/operator-guide/microsoft-entra-auth/awx-settings.png) | ||
|
||
3. Fill in the required fields, such as **Azure AD OAuth2 Key** and **Azure AD OAuth2 Secret**. Click on the **Save** button to apply the changes. | ||
|
||
:::note | ||
- **Azure AD OAuth2 Key** refers to the **Application (client) ID** of your Microsoft Entra Application. | ||
- **Azure AD OAuth2 Secret** refers to the **Application Client Secret** value of your Microsoft Entra Application. | ||
::: | ||
|
||
![AWX Azure AD Settings](../../assets/operator-guide/microsoft-entra-auth/awx-entra-settings.png) | ||
|
||
4. Verify that the OIDC authentication is configured correctly by logging in to the AWX using **Sign in with Azure AD** button. | ||
|
||
![AWX Login with Azure AD](../../assets/operator-guide/microsoft-entra-auth/awx-login-entra.png) | ||
|
||
After completing these steps, the Ansible AWX will be configured to use OIDC authentication with Microsoft Entra as the Identity Provider. | ||
|
||
## Related Articles | ||
|
||
- [OpenID Connect (OIDC) Authentication Overview](./oidc-authentication-overview.md) |
Oops, something went wrong.