Add Azure AD authentication to your Interana instance
Why use an authentication provider?
Some Interana users like to use an authentication provider instead of the standard Interana password authentication flow. The benefits of using an auth provider include exercising more control over which users in your organization can register for Interana and providing a single sign-on method for Interana and other applications you use.
Before you start...
Make sure you've spoken with your customer success manager to determine which authentication provider best fits your needs. Your CSM will also give you two pieces of information that you will need before you start: the Sign-On URL and the AppID.
Azure AD Configuration
Now you're ready to set up your Azure AD authentication application!
1. Open the Azure portal
2. Click on Active Directory, which will open in a new window
3. Click on Applications
4. At the bottom of the page, click Add
5. Click "application my organization is developing"
6. Name the application. For the application type, select "WEB APPLICATION AND/OR WEB API"
7. Enter the Sign-On URL and the AppID that your CSM gave you. Be careful--it's important to get these exactly right!
8. Continue through the final steps until the application is created
9. Click on Application, then Configure
10. At the bottom, click View Endpoints
11. You will see a link to the "FEDERATION METADATA DOCUMENT." Please send this link to your CSM or to help@interana.com! If you prefer, you can also send us the entire metadata file instead of sending a link to the hosted file.
12. Assign users to the application using these guidelines from Azure AD
What's Next
Don't forget to send us your Federation Metadata Document! Once we have that, we can get everything hooked up on our side. We will work with you to plan a time to switch over to the new authentication flow and have someone on your team validate that everything is working properly.