IBM Cloud Docs
Configuring Azure OIDC authentication in an external IdP

Configuring Azure OIDC authentication in an external IdP

Admin user can manage OIDC configurations from Netezza UI.

To configure Azure OIDC on Netezza UI, Client ID, Tenant ID, and Client Secret are required. These details are available on the Azure portal. Update redirect URI on Azure IdP portal, see Configure Azure OIDC details.

How to get Client ID, Tenant ID, and Client Secret

  1. Login to the Azure Portal.
  2. Navigate to the Azure AD (Active Directory).
  3. Select App registrations and locate the Azure AD application to find the Client ID and Client Secret Key.
  4. In the Overview section, you will find Application (client) ID and Tenant ID.
  5. In the Azure AD application, select Certificates & Secrets from the Manage sidebar.
    1. If you already have secret, go to Configure redirect URI on Azure IdP to get OIDC redirect URI.
    2. If you are creating secret for the first time, click New client secret and fill the secret details.
  6. Copy the client Secret value and store it for later use.

Ensure to copy the Value, not the Secret ID.

Configure Azure OIDC details

  1. Login to Netezza UI as a user who is part of the administrative group.
  2. Go to Settings tab.
  3. Click on OIDC to enable OIDC authentication.
  4. Enable Azure OIDC configuration.
  5. Add Client ID, Tenant ID, Client Secret and click the Save button.

Configure redirect URI on Azure IdP

  1. Login to the Azure portal.
  2. Navigate to the Azure AD.
  3. Select App registrations, locate the Azure AD application.
  4. Navigate to the Authentication section -> Add platform -> select Web.
  5. Copy OIDC redirect URI from the IdPconfiguration page on the console. Update "Redirect URIs" with the copied URI.