Configuring Azure OIDC authentication in an external IdP
Admin user can manage OIDC configurations from Netezza UI.
To configure Azure OIDC on Netezza UI, Client ID
, Tenant ID
, and Client Secret
are required. These details are available on the Azure portal. Update redirect URI
on Azure IdP portal, see Configure Azure OIDC details.
How to get Client ID
, Tenant ID
, and Client Secret
- Login to the Azure Portal.
- Navigate to the Azure AD (Active Directory).
- Select App registrations and locate the Azure AD application to find the Client ID and Client Secret Key.
- In the Overview section, you will find Application (client) ID and Tenant ID.
- In the Azure AD application, select Certificates & Secrets from the Manage sidebar.
- If you already have secret, go to Configure redirect URI on Azure IdP to get OIDC redirect URI.
- If you are creating secret for the first time, click New client secret and fill the secret details.
- Copy the client Secret value and store it for later use.
Ensure to copy the Value
, not the Secret ID
.
Configure Azure OIDC details
- Login to Netezza UI as a user who is part of the administrative group.
- Go to
Settings
tab. - Click on
OIDC
to enableOIDC
authentication. - Enable
Azure OIDC
configuration. - Add
Client ID
,Tenant ID
,Client Secret
and click theSave
button.
Configure redirect URI on Azure IdP
- Login to the Azure portal.
- Navigate to the Azure AD.
- Select App registrations, locate the Azure AD application.
- Navigate to the Authentication section -> Add platform -> select Web.
- Copy
OIDC
redirect URI from the IdPconfiguration page on the console. Update "Redirect URIs" with the copied URI.