It's recommended to setup and test AzureAD SSO before setting up SCIM.
How it works
Smart Space AzureAD SSO integration uses the OAuth 2.0 protocol to authenticate users via AzureAD. For more information on OAuth 2.0 in the Microsoft Identity platform, refer to the following articles:
- OAuth 2.0 and OpenID Connect (OIDC) in the Microsoft identity platform.
- OAuth 2.0 authorization with Microsoft Entra ID
- Microsoft identity platform and OAuth 2.0 authorization code flow
How to Setup
Step 1: Create an Enterprise Application
Azure Portal > Microsoft Entra ID > Enterprise Applications > New Application > Create your own application.
What's the name of your application | Smart Space |
What are you looking to do with your application | Integrate any other application you don't find in the gallery (Non-gallery) |
Azure Portal > Microsoft Entra ID > App Registrations > All Applications > Smart Space
Select Authentication on the side menu
Click Add a platform
Select Web
Enter the Redirect URI: https://subdomain.smartspace.com.au/users/auth/azure_activedirectory_v2/callback
(replace subdomain with your Smart Space subdomain)
Click Configure
Click Add a platform again
Select iOS / macOS
Enter the Bundle ID:
au.com.smartspace
Click Configure, then click Done
Click Add a platform again
Select Android
Enter the Package Name:
au.com.smartspace
Enter the Signature Hash:
EaGih54jERnk6VMZPZmOdjzyd2Q=
Click Configure, then click Done
At the bottom of the page, ensure that Accounts in this organizational directory only - Single tenant) is selected for Who can use this application or access this API?
Select Overview on the side menu, and take note of the following values (you can find these later on the Overview pane):
- Directory (tenant) ID:
- Application (client) ID:
Step 2: Configuring Permissions
Select the API Permissions pane in Smart Space | App Registration
Click Add a Permission > Select Microsoft Graph on the Microsoft APIs tab > Select Application Permissions.
- Expand Group and check Group.Read.All
- Expand User and check User.Read.All
- Click Add permissions
Click Add a Permission > Select Microsoft Graph on the Microsoft APIs tab > Select Delegated Permissions.
- Expand User and check User.Read
- Click Add permissions
At this stage, you should have the permissions configured as follows:
Click the Grant admin consent button to grant admin consent for the configured permissions. Once processed, you should see green ticks in the status column.
Step 3: Create an authentication secret
Select the Certificates and Secrets pane in the Smart Space App Registration.
Click New Client secret
- Description: Smart Space SSO (or anything more meaningful for you)
- Expires: 730 days (24 months)
Click Add
Take note of the Value in the Client secrets table - this is your Client Secret. (Note: Client secret values can only be viewed immediately after creation. Be sure to record the secret when created - before leaving the page.)
Step 4: Enable AzureAD SSO in Smart Space
In Smart Space, go to Settings > Integrations > Azure AD.
- Select Enable Azure AD SSO Integration
- Input the Tenant ID, Client ID, and Client secret you noted from the above steps.
- Click Save
If successful, the Azure AD integration will change from Not Setup to Enabled.
Step 5: Testing
Add a user to Smart Space using the email address of a user in Azure AD and test that you can successfully login to Smart Space using your AzureAD identity.
Things to be aware of
- The Client Secret that you generated will expire after 2 years, and a new one needs to be generated and saved to the Smart Space Azure AD settings before the existing one expires. You can have multiple Client Secrets in the App Registration. Set a reminder in your calendar in 12 months' time to update to a new Client secret.
- The app registration requires Group.Read.All and User.Read.All rights to support a hybrid SSO configuration where some users are authenticated via Azure AD SSO and others are authenticated using their Smart Space credentials, and to list Azure AD groups to allow mapping authorisation mapping.
- Master Admin accounts support a 'break glass' login which allows them to login to the SmartSpace Web Portal using a local Smart Space account so that system access can be gained in the event of an issue with AzureAD SSO.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article