Azure Active Directory
Azure Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Azure Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information.
Creating an Azure Active Directory connection
Use one of the following methods to make a connection:
Using OAuth
Creating your connection
- In the Blink platform, navigate to the Connections page > Add connection. A New Connection dialog box opens displaying icons of external service providers available.
- Select the Azure Active Directory icon. A dialog box with name of the connection and connection methods appear.
- (Optional) Edit the name of the connection. At a later stage you cannot edit the name.
- Click Azure Active Directory to authenticate using OAuth.
- Sign in using your credentials.
Using App Registration
To create the connection you need:
- A client ID
- A client secret
- A tenant ID
Obtaining the credentials
Log into the Azure Portal.
Go to the Azure Active Directory resource.
In the left-hand menu, click App registrations.
Select the app for which you want to grant permission.
In the left-hand menu, click API permissions.
Click Add a permission and select Microsoft Graph.
Click Application permissions and select the following permission:
User.ReadWrite.All
GroupMember.ReadWrite.All
Group.ReadWrite.All
Directory.AccessAsUser.All
Click Add permissions to save the changes.
Click Grant admin consent for
<your tenant>
on the API permissions page.
Creating your connection
- In the Blink platform, navigate to the Connections page > Add connection. A New Connection dialog box opens displaying icons of external service providers available.
- Select the Azure Active Directory icon. A dialog box with name of the connection and connection methods appear.
- (Optional) Edit the name of the connection. At a later stage you cannot edit the name.
- Select App Registration as the method to create the connection.
- Fill in the parameters:
- The client ID
- The client secret
- The tenant ID
- (Optional) Click Test Connection to test it.
- Click Create connection. The new connection appears on the Connections page.
Using LDAP
Azure Active Directory supports administration using the LDAP protocol, allowing you to manage your workspace using Blink's LDAP actions instead of the Azure Active Directory integration.
In order to expose your Azure Active Directory workspace as an LDAP server, follow these steps:
- Set up an Azure Active Directory Domain Services managed domain.
- Access the domain controller's virtual subnet.
- If your runner is running on premises and connected to the Azure virtual subnet, your LDAP server URL is the domain controller's IP address.
- Otherwise, in order to use an external runner, you need to add a public IP to the virtual subnet and assign it to your domain controller.
- To create an LDAP connection to this server:
- Use the IP address accessible to the runner as your URI, with
ldap://
protocol, orldaps://
if you enabled "Secure LDAP" - Acquire the Distinguished Name of an Azure Active Directory user who has permissions to the server. You can use dsquery on a connected Windows Server to obtain the full name of a user.
- Use the password of the specified user. After activating your domain controller, the user should reset their password so that it is properly synced.
- Use the IP address accessible to the runner as your URI, with