Skip to main content

Azure AD Open ID Connect

in Authentication and SSO
Authors list
Published: 15 Dec 2022|Last updated: 15 Dec 2022

If you would like to configure Microsoft Office365 logins for users using OpenID Connect, the following guide will describe the process.

Note

As you are unable to limit who has access to this application, we recommend only configuring OpenID Connect for User logins. Our SAML guide gives more control over access to your instance, so we recommend using that for Agent logins.

Creating the app in Deskpro Copy link to Creating the app in Deskpro to clipboard

  1. In your helpdesk, go to Admin > CRM > User Auth & SSO, then under Add Authentication, select OpenID Connect Authentication Screenshot_20221214_160519.png

Warning

Deskpro supports both OpenID and OpenID Connect authentication methods. The services are not compatible with each other. This guide is specifically for OpenID Connect.

  1. Under Single Sign On Identity, enter an identifier. This can be anything, but is required to proceed. Screenshot_20221214_160652.png You may also want fill out the Login Button Text field for testing.

Click Add to create the application.

  1. Once the app is created, click Manage on the app, then Configuration Settings to display more options.

Copy the value of the Callback URL field. Screenshot_20221214_160715.png

Creating the app in Azure AD Copy link to Creating the app in Azure AD to clipboard

  1. Within your Azure AD account, select App Registrations then New Registration

  2. Enter a name to identify the application, select the supported account types and for the Redirect URI, select the Web platform and paste your Callback URL in the URL field. Screenshot_20221214_161609.png

  3. This should create the app and drop you into the Overview page, and we need 2 pieces of information from this page. First, make a note of the Application (client) ID Screenshot_20221214_162705.png Then, select Endpoints at the top of the page, and make a note of the OpenID Connect metadata document address. Remove the /.well-known/openid-configuration from the end of the URL. Screenshot_20221214_162507.png

  4. Select Certificates & secrets from the menu and generate a new secret. Make a note of the Secret Value. Screenshot_20221214_162836.png

  5. Finally, select Authentication and check the ID tokens box under Implicit grant and hybrid flows. Screenshot_20221214_163050.png

Configuring the app in Deskpro Copy link to Configuring the app in Deskpro to clipboard

  1. Back in Deskpro, select your app and click Manage and Configuration Settings to display the app configuration, and enter the information you collected from Azure AD into the application

Screenshot_20221214_162935.png

  • Provider URL - The OpenID Connect metadata document address without /.well-known/openid-configuration

  • Client ID - The Application (client) ID

  • Client Secret - The Secret Value

Once the information is set, click Save

  1. Activate the authentication method by toggling the switch, then head to your helpdesk to test. If you set the Button Text, there will be a new button under the login for your OpenID Connect auth method. Screenshot_20221215_112119.png

HelpfulUnhelpful
next pageLDAP Setup
previous pageMicrosoft Entra (Azure AD) SAML Setup

Please log in or register to submit a comment.