Forum Discussion
Ashok_Mohanty
Feb 26, 2020Copper Contributor
Authorize access to web applications using OpenID Connect and Azure Active Directory
I have register my application with AD Tenant with following steps:
1. In the Azure Active Directory left menu, select App Registrations, and then select New registration.
2. Given application name and under support account types , selected the option "Accounts in this organizational directory only"
3. Provided Redirect URI.
4. Successfully register my app and integrated with AzureAD. I can able to authenticate.
5. The issue is anyone in my organization can access this app even if i have added limited users in Users and Groups section.
6. I want to restrict my app to limited users only with permission.
7. How i will do that? My application only support OPENID authentication. No SAML support .
8. I am implementing Apache Guacamole
- Have you tried going to 'Enterprise Applications', finding your AAD App there and configuring 'User assignment required?' to Yes in Properties?
- Thijs LecomteBronze ContributorHave you tried going to 'Enterprise Applications', finding your AAD App there and configuring 'User assignment required?' to Yes in Properties?
- Ashok_MohantyCopper Contributor
Thijs Lecomte Thank you so much for your help. It worked for me. But facing another issue. I can see my app in Azure application list. https://account.activedirectory.windowsazure.com/r#/applications. But when i am clicking on my app, its throwing the following error " You cannot access this application because it has been misconfigured. Contact your IT department and include the following information: Undefined Sign-On URL for application" But when i am trying my website url in browser it is working perfectly fine.
- Thijs LecomteBronze ContributorHave you configured all the settings in the 'authentication' tab of the app registration?