Microsoft Entra ID OnPrem
This guide will walk you through the steps required to configure Microsoft Entra ID as a Single Sign-On (SSO) provider in On Premise deployment of Observo using OpenID Connect (OIDC).
Prerequisites
Active Entra ID.
A running Observo On Premise deployment.
Admin access to both Entra ID and Observo.
Steps to Set Up Entra ID as an OIDC Identity Provider in Observo
1. Create an App Registration in Entra ID
You need to create an App registration in Entra ID to enable On Premise Observo to authenticate users.
Log into Azure Portal and Go to Entra ID Service.
Go to App registrations under Manage tab in left Menu.
Click on New Registration.
Provide a user facing display name for the App registration.
Then Select the supported account types who can use this app.
In Redirect URI (optional) section, Keep this empty. We will configure this in later part of this documentation.
Click on Register button to create the App Registration.
2. Retrieve Entra ID Application Credentials and URLs
After creating the app registration in Entra ID, you will need the credentials and URLs for Observo Keycloak configuration.
In the app's Overview section, find Application (client) ID. Note this value as Client ID.
From the top menubar select Endpoints. Note the following endpoints:
OAuth 2.0 authorization endpoint (v2) -> Authorization URL
OAuth 2.0 token endpoint (v2) -> Token URL
Go to Manage > Certificate & secrets and create a new Client Secret. Note the value of this secret as Client Secret
3. Configure Observo to Use Entra ID as an Identity Provider
Now, configure Entra ID as an Identity Provider in Observo keycloak.
Log into Observo keycloak with
Observo Adminusers credential. Observo keycloak is hosted in this URLhttp://<ObservoOnPremURL>/observo-authSelect the realm of your Observo deployment to configure Entra ID SSO.
masteris the default realm.In the left-hand menu, click Identity Providers.
From the Add provider dropdown, select OpenID Connect v1.0.
Fill in the following details:
Alias:
entra-oidc.Display name: (Optional) The name that users will see on the login screen.
Turn off the
Use discovery endpointif it's enabled.Authorization URL: Use the Authorization URL from step (2).
Token URL: Use: Use the Token URL from step (2).
In the Client Authentication section:
Client ID: Paste the Client ID from Entra ID.
Client Secret: Paste the Client Secret from Entra ID.
Click Save.
Now go into the newly created Identity Provider and click on Advanced drop down field. Add the
openid email profilescopes.
4. Add Redirect URI in Entra ID
After creating the Identity Provider in Keycloak, You need to provide the Redirect URL in Entra ID.
Observo Keycloak
Go the identity provider you just created in keycloak for Entra ID and note Redirect URI from top of the page. It will look something like this
https://<YOUR_DOMAIN>/observo-auth/realms/master/broker/entra-oidc/endpointEntra ID
Open the App registration you created in Entra ID.
Go to Manage > Authentication.
Find Platform configurations and click on Add a platform.
Select Web application > Web and provide the Redirect URI from previous step.
You have successfully configured Entra ID as your SSO provider for OnPrem Observo.
5. Add Role Mapper (Optional)
For using the role mapper feature of observo, follow the below steps:
Go to the Realm roles of keycloak and create the roles you want to use in role mapping.
Now go the identity provider and select the Entra ID IdP that created in last step.
We need to create mappers that maps the Entra ID token claims to keycloak roles. Later the keycloak roles will be inserted into token.
Steps to create a Mapper for a Role
Select the
Mapperstab and click onAdd Mapper.Give a name for the new mapper (For example:
AdminRoleMapper).Select
Sync mode overridetoForceUse
Advanced Claim to Roleas Mapper Type.Select on
Add Claimsand use your Entra ID claim name asClaim Keyand regex of claim value.Mark
Regex Claim Valuesif you are using regex in the claim value.Now choose the keycloak realm roles that you want to map with your Entra ID claim.
5. Test the Integration
Once the configuration is saved, test the Entra ID SSO integration.
Access Observo UI.
Select the Observo Entra ID SSO option
Now log in with your Entra ID credentials.
After successful authentication, you should be redirected back Observo UI and logged in.
By following these steps, you should have Entra ID successfully integrated in Observo On Premise deployment.
Last updated
Was this helpful?

