MS Entra ID (OIDC)
Prerequisites
Permissions required for registering and configuring an app in Microsoft Entra ID.
The account must have permission to manage applications in Microsoft Entra ID. Ideally the account should be in the Global Admin role to grant admin consent.
Implement Single Sign-On (SSO)
It is recommended to use two separate browser tabs for the Azure (A) and Keycloak (K) portals to make it easier to apply the settings.
(A) In the first tab sign in to the Azure Portal.
(A) Search for Microsoft Entra ID. Expand Manage in the left pane and click App registrations.
(A) Select Endpoints.
(A) Copy the value from the OpenID Connect metadata document field.
(K) Open a new tab in your browser and login to the target Spark tenant. Access the Keycloak console from the User menu.
(K) Login to the Keycloak Admin Console using your admin credentials.
(K) Select Identity Providers from the left pane.
(K) Expand the Add Provider dropdown and choose OpenID Connect v1.0.
(K) Find the Discovery Endpoint field and paste the OpenID Connect metadata document.
(K) Click on the Show metadata link. You'll notice that some metadata fields are automatically filled in.
(K) Fill in values for the Alias and Display Name fields. The Alias should be a lowercase name without special symbols. Please note this Display Name will appear in the button on the Spark login page.
(K) Copy the Redirect URI value.
(A) Switch to Microsoft Entra ID. Select App registrations, then select New registration.
(A) Enter a name for the application, e.g.
Coherent Spark UAT.(A) Select the supported account type that is appropriate for your organization.
(A) Under Redirect URI, copy the edited Redirect URI value from before.
(A) Select Register.
(A) Copy the Application (Client) ID from the Overview page.
(K) Return to Keycloak. In the Client ID field, paste the value copied in the previous step.
(A) Switch to Microsoft Entra ID. Go to Certificates & secrets.
(A) Select New Client Secret and fill out the Description and Expiration fields.
(A) Select Add and copy the value.
(K) Return to Keycloak. In the Client Secret field, paste the value copied in the previous step.
(K) Scroll to the bottom of the page and click Save.
(A) Switch to Microsoft Entra ID. Go to API permissions.
(A) Select Grant admin consent for {your Microsoft Entra ID} to grant permissions to the application.
Navigate to your Spark tenant and sign in using the newly created provider. There will be a button on the Keycloak login page with the display name defined earlier.
Configure app roles to Spark user groups
It is recommended to use two separate browser tabs for the Azure (A) and Keycloak (K) portals to make it easier to apply the settings. In this guide, we will setup the automatic roles for the tenant-admin role.
(A) In the first tab sign in to the Azure Portal.
(A) Search for and select Microsoft Entra ID.
Select App registrations, then select the application you previously created and click App roles.
(A) Select Create app role.
(A) Provide the following values then select Apply.
KeyValueAllowed member types
User/GroupsDisplay name
tenant-adminValue
tenant-adminDescription
Your app role description
Do you want to enable this app role?
True(A) Click Overview in the left pane and then on your application in Managed application in local directory.
(A) Select Properties from the left pane.
(A) Set Assignment required? to
Trueand select Save.(A) Select Users and Groups from the left pane and then Add user/group.
(A) Assign your test account to the
tenant-adminrole.(K) Open a new tab in your browser and login to the target Spark tenant. Access the Keycloak console from the User menu.
(K) Login to the Keycloak Admin Console using your admin credentials.
(K) Select Identity Providers from the left pane and then the identity provider you configured in the previous section.
(K) Select the Mappers tab and then Add mapper.
(K) Provide the following values.
NameValueName
tenant-adminSync mode override
forceMapper type
Advanced Claim to Group(K) Click Add Claims.
(K) Provide the following values:
KeyValuerolestenant-admin(K) Leave Regex Claim Values as Off (which is the default).
(K) Click Select Group, choose
tenant-admin, then click Select.(K) Click Save.
Sign in into Coherent Spark with your test account. Click on your initials and hover over the groups icon to confirm your membership in
tenant-admin.We highly recommend creating at least a few additional app groups relevant for Private tenants:
Group for
supervisor:pfuser accounts. In Spark,supervisor:pfmembers can manage permissions across all folders.Groups for "standard" user accounts, e.g.
user:teamA,user:teamB. These groups can be assigned to the users in your organization not responsible for tenant administration. Creating multiple roles for "standard" user accounts can be useful to separate access between teams.
Enable Privileged Identity Management (PIM)
See MS Entra ID Privileged Identity Management (PIM).
Create an enterprise application for Coherent Spark
See Microsoft Apps.
Last updated
