deployment

No menu items for this category
OpenMetadata Documentation

Azure AD SSO Authentication – Public Client Configuration

Azure Active Directory (Azure AD) Single Sign-On (SSO) enables users to authenticate using their Microsoft 365 / Entra ID accounts via OAuth 2.0 and OpenID Connect (OIDC) protocols.

This guide covers the Public Client setup, intended for applications that cannot securely store client secrets.

Azure AD SSO Configuration - Public Client
  • Definition: Defines whether the application is public (no client secret) or confidential (requires client secret).
  • Options: Public | Confidential
  • Example: Public
  • Why it matters: Determines the OAuth flow and security level.
  • Note:
    • Use Public for clients that cannot store secrets.
    • Azure typically recommends Confidential for secure apps.
  • Definition: The Application (Client) ID assigned to your app in Azure AD.
  • Example: 12345678-1234-1234-1234-123456789012
  • Why it matters: Azure AD uses this to identify your application.
  • Note: Found in Azure Portal → Azure Active DirectoryApp registrations → Your App → OverviewApplication (client) ID
  • Definition: The redirect URI where Azure AD sends authentication responses.
  • Example: https://yourapp.company.com/callback
  • Why it matters: Must exactly match what's registered in Azure AD; mismatches will cause authentication failures.
  • Note:
    • Configure in Azure AD → App registrationsAuthenticationRedirect URIs
    • Always use HTTPS in production environments.
  • Definition: Azure AD endpoint that issues tokens for your tenant.
  • Example: https://login.microsoftonline.com/your-tenant-id
  • Why it matters: Tells OpenMetadata which Azure tenant to use for authentication.
  • Note:
    • Replace your-tenant-id with your actual tenant GUID.
    • For multi-tenant apps, use common instead of the tenant ID.
  • Definition: URL(s) where Azure AD publishes public keys used for verifying JWT tokens.
  • Example: ["https://login.microsoftonline.com/common/discovery/v2.0/keys"]
  • Why it matters: Required to validate token signatures.
  • Note: Typically auto-discovered from Azure’s OIDC metadata; manual configuration rarely needed.
  • Definition: The algorithm used to validate JWT token signatures.
  • Options: RS256, RS384, RS512
  • Default: RS256
  • Example: RS256
  • Why it matters: Must match Azure AD’s signing algorithm.
  • Note: Azure AD typically uses RS256.
  • Definition: Claims in the JWT token used to identify users.
  • Example: ["preferred_username", "email", "sub"]
  • Why it matters: These claims are used to recognize and map users in OpenMetadata.
  • Note: Common claims include: email, preferred_username, upn, sub
  • Definition: A list of users (by email or UPN) granted admin access.
  • Example: ["admin@company.com", "superuser@company.com"]
  • Why it matters: Grants administrative permissions within OpenMetadata.
  • Note: Entries must match the value from the selected JWT principal claim.
  • Definition: A list of service accounts or bot users for automated operations.
  • Example: ["metadata-bot@company.com"]
  • Why it matters: Designates non-human principals for running background jobs or automation tasks.
  • Definition: Default domain used for user principal resolution.
  • Example: company.com
  • Why it matters: Used to complete email addresses or usernames if only the prefix is provided.
  • Note: Typically matches your organization’s primary domain.
  • Definition: Whether to restrict login to users from a specific domain.
  • Default: false
  • Example: true
  • Why it matters: Adds security by limiting access to a known domain space.
  • Definition: Enables TLS/SSL for all SSO communication.
  • Default: false
  • Example: true
  • Why it matters: Encrypts all communication with Azure AD for added security.
  • Note: Should be enabled for production environments.
Key FieldExample / Default
Client TypePublic
Client ID12345678-1234-1234-1234-123456789012
Callback URLhttps://yourapp.company.com/callback
Authorityhttps://login.microsoftonline.com/your-tenant-id
Public Key URLshttps://login.microsoftonline.com/common/discovery/v2.0/keys
Token ValidationRS256
JWT Claims["preferred_username", "email", "sub"]
Admin Principals["admin@company.com"]
Enforce Domaintrue
Use TLS (SSL)true