Sign in Podio.com using AZURE AD - azure-active-directory

I need users to sign in with microsoft account in podio.
For that to accomplish, they need authorization from administrator on microsoft Azure AD
Podio has a SSO ready for 0365 but it doesnt work with organizations on Azure AD.
I had this meet with an Azure Consultant and she requested me which kind of integration does podio support. Like SAML 2.0 or 0Auth 2.0
Podio does not support SAML 2.0 (Only via ShareFile) so I think that we will have to go for the API integration using OAuth 2.0
Any advice?
Thanks in advance,
https://developers.podio.com/authentication
We tried SSO for 0365.
We tried to configure Azure's admin but we need some api info like URI response

Related

Multi tenant SAML SSO app installed with OAuth flow?

I have a multi tenant enterprise app. It authorises a few graph API permissions when installed and has SAML SSO configured. The whole idea is that my customers can install this and in one process grant my application access to their tenant, and setup SSO for that customers users.
The graph API permissions work totally as expected, I get the needed access to the tenants who installed the app.
Then there is the SAML SSO part. That's just totally not working. In my test tenant where I installed my app, it says that the app has SAML SSO and that it is only application owner who can configure - all fine.
I then try to log in (to the web app using this SSO configuration) with a user from my test tenant - no luck!
First I thought that it had to do with the user not being assigned the app, but it complains the the application in tenant A is not available for user in my test tenant and the user should be added to tenant A. That of course is not a solution since I want to use this for customers.
So right now I am stuck with 2 app's. One gallery app for SAML SSO and my app granting API permissions. It works, but it just seems SO stupid. Isn't there a better way?
Azure AD SAML applications are not intended to be multi-tenant, this is why you need to invite external users as guests.
It's worth to mention it's possible for an Azure AD app to support both OIDC/OAuth2 and SAML and thus rely on the same session cookie to obtain an access token for MS Graph.
If you need multi-tenancy, you should use modern protocols such as OpenID Connect for authentication and OAuth2 for authorization. MS Graph relies on JWT access token anyways.

Integrate SSO for a 3rd party enterprise application

I want to integrate SSO in my client's azure AD with a 3rd party enterprise application.
We dont have access to the backend of the 3rd party appliction which is basically a SAAS. So the 3rd party app team asked us to setup SSO in azure ad portal and share with them the signin url and IDP metadata.
Which option I should choose in azure ad portal to do this:
enterprise application or app registration?
The way you can add your application to azure ad is completely depending on the SSO type you are using for your application.
If the application was registered using App registrations, then the single sign-on capability is configured to use OIDC OAuth by default.
If you register through Enterprise application, you will be having option to setup SAML based, password based authentication types.
Here is the reference doc to setup SAML based SSO SAML based SSO
If you want to setup OIDC based SSO you can use this OIDC SSO
Quickstart
Many apps have already been pre-configured to work with Azure AD. These apps are listed in the gallery of apps that you can browse when you add an app to your Azure AD tenant.
Here is the reference for integrating SAAS application with azure ad SAAS App integration.

Active Directory B2B External Idp integration

Azure AD B2B has a preconfigured Google integration and the ability add external Idp. Has any one configured it with Okta?.
Looking for guidance - What do we need from Okta to get the meta data etc.
Tried the Google B2b integration and it works. But stuck trying to create external SAML provider for integration with Okta. Are there any step by step guidance or instructions to get the info from Okta to enable this?
Here is the generic documentation on the preview feature. That is a starting point for your endeavor.
Using this documentation (and respective OKTA one - probably this one) you should be able to configure OKTA as a SAML IdP for Azure AD Direct Federation feature.
Important terms in that setup: OKTA will be the SAMP IdP (Identity Provider) while Azure AD will be SAML SP (Service Provider).
There is nothing more concrete about integrating OKTA as IdP for direct federation. Also please note that this feature is in preview in AAD.

Azure AD Apps: Migrating to v2.0

This is my scenario: Client Windows Forms app authenticates with Azure AD and uses the access token to access several web api services. Until now, I was using the endpoint 1 and using the Azure portal to register both apps. It seems like there's a new way now, but I'm a little lost here.
For starters, it seems like both apps (client and server) can be registered in the same app in the new apps portal (https://apps.dev.microsoft.com). I do see a place to add platforms and I have added entries for the native and web api. But where do I go from here? For instance, in the azure portal, I must configure the client app in order for it to call the web api services. How do I that here?
Is there a complete sample for this scenario like the one we have to ADAL (https://learn.microsoft.com/en-us/azure/active-directory/develop/active-directory-code-samples#native-application-to-web-api)?
Thanks,
Regards,
Luis
Please firstly refer to this document to know what's different about the v2.0 endpoint .When you build applications that integrate with Azure Active Directory, you need to decide whether the v2.0 endpoint and authentication protocols meet your needs. Please see the limitations of azure ad v2.0, such as you can use the v2.0 endpoint to build a Web API that is secured with OAuth 2.0. However, that Web API can receive tokens only from an application that has the same Application ID .
The v2.0 endpoint does not support SAML or WS-Federation; it only supports Open ID Connect and OAuth 2.0 ,To better understand the scope of protocol functionality supported in the v2.0 endpoint, read through OpenID Connect and OAuth 2.0 protocol reference.
You could refer to document how to call a web API from a .NET web app with Azure AD V2.0 (using MSAL to acquire and use access tokens), and here is the code sample on Github . The document includes how to add basic sign-in to a web app or how to properly secure a web API in azure ad v2.0 .

Angular Support For Azure AD B2C

Azure AD B2C now supports SPAs. But is this supported by Angular? While implementing Azure AD (not B2C) I found a file adal-angular.js. I can inject its services, call its extended end points and get my way done.
Is there any file for Azure AD B2C? Or adal-angular.js works for Azure AD B2C too? Please correct me if anything I wrote above is wrong.
adal-angular.js will only work for non-converged AzureAD apps (apps that are registered in the Azure Portal AzureAD Blade). AzureAD B2C apps are converged so this library will not help you.
AzureAD B2C does in fact support SPA's using the open source library hello.js. Here is a SPA code sample. There is not currently any Angular code samples for AzureAD B2C, but as an oAuth 2.0 service you should be able to hook up almost any open source Angular oAuth2.0 library that supports implicit flow.
We just released our solution to integrate Angular with AAD B2C: https://github.com/3DSemantix/angular-asp.net-core-aad-b2c
The "SPA code sample" from MS is a bit weird when I looked at it (refreshing the token feels hacky).

Resources