Configure Microsoft Entra ID
    • 15 Nov 2024
    • 4 Minutes to read
    • Contributors
    • PDF

    Configure Microsoft Entra ID

    • PDF

    Article summary

    As a Formpipe Cloud customer using Microsoft Entra ID as the IdP, you must follow this process to set up Microsoft Entra ID for Autoform DM SSO:

    1. Create an enterprise app and connect it to the Formpipe app registration. This will allow users from your Microsoft Entra ID directory to access the Formpipe Autoform DM application.

    2. Create a collection of groups to control access to Autoform DM, and then assign these groups to the enterprise app.

    3. Provide the OID (Object ID) and names of those assigned groups to Formpipe, so that Formpipe can create the required mappings. For more information about group mapping, see Security Model.

    4. Test access to Autoform DM.

    The following sections describe each of these tasks.

    Your Formpipe consultant can guide you through these tasks if needed, and is available to assist you with any questions or issues that you have.

    Create an Enterprise App and Connect It to Formpipe

    During the preliminary stages of SSO setup, Formpipe will create (within the Formpipe Azure tenant) the app registration that forms the authentication connection to Azure. After this is done, Formpipe will provide you the application ID of the app registration so that an enterprise app can be provisioned within your tenant.

    The provisioned enterprise app must grant permissions for Formpipe to obtain basic details about a user, which are needed to complete the login process. This access will be restricted to only users granted access to Formpipe applications.

    When instructed by Formpipe, use either the PowerShell script method or the URL method to provision the enterprise app. Both methods are described below.

    After you have provisioned the enterprise app, follow these steps to navigate to it:

    1. In the Azure portal, navigate to the Entra ID view, then click Enterprise Applications.

    2. To locate the newly provisioned enterprise app, search for Formpipe.

    3. Click the link to the application in the search results.

    PowerShell Script Method

    Run a PowerShell script (which Formpipe can provide). This script takes the application ID provided to you by Formpipe as a parameter.

    URL Method

    Go to the following URL:

    https://login.microsoftonline.com/<tenant-id>/adminconsent?client_id=<app-id>

    Appropriately substitute <tenant-id> and <app-id> with your tenant-id and the application-id Formpipe has provided.

    Require User and Group Assignment

    If you used the URL method, follow these additional steps:

    1. In the Azure portal, navigate to the enterprise app (as described in the steps above).

    2. On the Properties page, set Assignment Required? to Yes.

    Doing this ensures that only the users and groups that are explicitly assigned to the application are granted the ability to access the Formpipe applications.

    It also helps avoid issues that arise when a user is assigned to a very large number of groups. If this is the case and Assignment Required is set to No, it is possible that group claims will not be passed through correctly, which can prevent the user from accessing the application.

    Assign Groups to the Application

    To enable a user to access the Formpipe application, you must assign them to the provisioned enterprise app. You should not directly assign users to the enterprise app. Instead, add users to the groups created for access control, and assign those groups to the enterprise app.

    For guidance on group structure and naming, see Security Model.

    To assign groups to the enterprise app, follow these steps:

    1. In the Azure portal, navigate to the enterprise app (as described above).

    2. On the Users and groups page, add the groups that you want to have access to the application.

    Note

    If a user that is not assigned to the enterprise app attempts to access Autoform DM, they will see the following message.

    Grant Admin Consent

    Depending on the Entra ID configuration, it is possible that when users attempt to access Autoform DM via SSO for the first time, their web browser will display a page asking them to approve Autoform DM’s access to their Entra ID profile, or asking them to request the permissions that will allow them to access Autoform DM.

    If this happens, the user must approve the request. Or, they must submit an approval request for an administrator to grant these permissions, which will delay the user’s access to the application until their request is approved.

    To avoid users having to go through this consent or approval stage, you can grant tenant-wide admin consent. This will apply only to users in groups that are assigned to the application. To do this, follow these steps:

    1. In the Azure portal, navigate to the enterprise app (as described above).

    2. On the Permissions page, click Grant admin consent.

      Note

      If you used the URL method to provision the enterprise app, this will already be done.

    Provide the OID (Object ID) and Names of Assigned Groups to Formpipe

    After you have assigned groups to the enterprise app, you must send Formpipe a list of the groups. This should include the group name (that you want to appear in Autoform DM) and the OID of the Azure group.

    For example, if two Microsoft Entra ID groups were created, you would provide their OIDs, along with the Formpipe group name that corresponds to them.

    Microsoft Entra ID group name

    OID

    Formpipe group name

    Formpipe DM Dev Users

    af54bea3-5123-4086-b945-4b6c7512c795

    Dev-Users

    Formpipe DM Admin Users

    bac62e1f-2152-6891-c36d-52cd18fce721

    Dev-Admins

    Test Access via SSO

    You will be notified when Formpipe has mapped these groups to the application. At this stage, perform tests to ensure that Autoform DM can be accessed via SSO.


    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.