Configuring Azure OIDC authentication in an external IdP
Admin user can manage OIDC configurations from Netezza UI.
To configure Azure OIDC on Netezza UI, Client ID, Tenant ID, and Client Secret are required. These details are available on the Azure portal. Update redirect URI on Azure IdP portal, see Configure Azure OIDC details.
How to get Client ID, Tenant ID, and Client Secret
- Login to the Azure Portal.
- Navigate to the Azure AD (Active Directory).
- Select App registrations and locate the Azure AD application to find the Client ID and Client Secret Key.
- In the Overview section, you will find Application (client) ID and Tenant ID.
- In the Azure AD application, select Certificates & Secrets from the Manage sidebar.
- If you already have secret, go to Configure redirect URI on Azure IdP to get OIDC redirect URI.
- If you are creating secret for the first time, click New client secret and fill the secret details.
- Copy the client Secret value and store it for later use.
Ensure to copy the Value, not the Secret ID.
Configure Azure OIDC details
- Login to Netezza UI as a user who is part of the administrative group.
- Go to
Settingstab. - Click on
OIDCto enableOIDCauthentication. - Enable
Azure OIDCconfiguration. - Add
Client ID,Tenant ID,Client Secretand click theSavebutton.
Configure redirect URI on Azure IdP
- Login to the Azure portal.
- Navigate to the Azure AD.
- Select App registrations, locate the Azure AD application.
- Navigate to the Authentication section -> Add platform -> select Web.
- Copy
OIDCredirect URI from the IdPconfiguration page on the console. Update "Redirect URIs" with the copied URI.