Microsoft Azure Active Directory plugin for Safeguard for Privileged Sessions
-
This plugin is experimental.
-
We welcome feature requests, pull requests, and bug reports submitted via GitHub.com, but in this case there is no guaranteed response time.
One Identity solutions eliminate the complexities and time-consuming processes often required to govern identities, manage privileged accounts and control access. Our solutions enhance business agility while addressing your IAM challenges with on-premises, cloud and hybrid environments.
For sales or other inquiries, visit the One Identity Contact page or call +1-800-306-9329.
Technical support is available to One Identity customers with a valid maintenance contract and customers who have trial versions. You can access the Support Portal at the One Identity Support page.
The Support Portal provides self-help tools you can use to solve problems quickly and independently, 24 hours a day, 365 days a year. The Support Portal enables you to:
- Submit and manage a Service Request
- View Knowledge Base articles
- Sign up for product notifications
- Download software and technical documentation
- View how-to-videos at YouTube
- Engage in community discussions
- Chat with support engineers online
- View services to assist you with your product
Relation to OAuth 2.0 RFC7649, RFC8252.
OAuth 2.0 defines several concepts and roles. This section provides a mapping between OAuth 2.0 and SPS terminology.
The OAuth 2.0 resource owner is identified as the gateway user in an SPS session. The gateway user may be a human, thus we sometimes refer to it as end-user.
User-agent is the gateway user's web browser.
Resource server is an SPS (virtual) appliance.
Client is again the SPS appliance as Safeguard does not require additional agent installation at the end-user.
Authorization server is a Microsoft Azure AD, also known as Login server.
Azure AD for SPS plugin utilizes the Device code flow. For further design details see OAuth 2.0 device authorization grant flow.
Add a new application to your Azure AD on the Azure Portal, see Quickstart: Register an application with the Microsoft identity platform.
Leave "Redirect URIs" empty as it is not required for the device code flow.
Make sure to set "Treat client application as a public client" to YES in the "Authentication" settings.