Setting up Microsoft Entra ID
Go to the Azure portal: https://portal.azure.com/#home
Select Microsoft Entra ID in the menu.
Navigate to Manage > App registrations menu option and click on +New registration button.
Insert the name of the application (e.g.
piplanning app
) and the Callback URL* into the Redirect URI (optional) field. Choose Web as the platform type.
IMPORTANT: Ensure you have the value Web selected in the platform type dropdown field when configuring the Redirect URL (optional) field.
*Note: The Callback URL can be found on the OpenID Connect page in the RTE Cockpit.Note**: Depending on how your Microsoft Entra ID is configured and which users you want to give access to piplanning.io, you might have to select a different option in the Supported account types section. If login for some users doesn't work, try changing this configuration option.
Check that the permissions are correct. You need the
Microsoft Graph User.Read
permissions to be able to login successfully.Note: If you want to map Microsoft Entra ID Groups to piplanning.io Teams automatically, you need to add
Microsoft Graph Group.Read.All
permissions as well.
Next is the creation of a Client Secret. This can be done by going in the Manage > Certificates & Secrets in the left navigation (or click the Add certificate or secret hyperlink under Essentials in the right pane), then click on +New client secret button.
The secret can now be copied* to your clipboard and saved. This information is needed in piplanning.io > RTE Cockpit > SSO > OIDC setup later.
*Note Client secret values can only be viewed once, immediately after creation. It is important you copy this value to be used in the setup in the RTE Cockpit.
Setting up the SSO > OIDC connection in piplanning.io
To configure piplanning.io with Entra ID using the OpenID Connection protocol:
Login to the RTE Cockpit and click on the SSO menu. Click the button Setup OpenID Connect button.
Enter a Connection name of your choice. Note: The Connection name value will appear as the label on the login button for your users. (e.g. "Entra ID Login")
Ensure the checkbox
Automatically discover endpoints
remains checked.Enter into the Issuer field the following URL:
https://login.microsoftonline.com/{tenantId}/v2.0
The {tenant ID} must be substituted with the value found on the Microsoft Entra ID application registration overview as Directory (tenant) ID:
Note: Depending on your configuration, you might have to use the older version of the API. If login doesn't work with your setup, try to remove /v2.0 from the Issuer URL: https://login.microsoftonline.com/{tenantId}
Fill in the client ID that you can also find in the Microsoft Entra ID > Application registration overview as Application (client) ID
Fill in the client secret from the value you previously generated under "Certificates & Secrets". This value was hopefully saved to your clipboard previously.
At this point the form should be complete, and the connection should be saved by clicking Save.
The piplanning.io login screen will now add the button for SSO via Microsoft Entra ID.
Mapping Entra Groups to piplanning.io Teams
In order to set up group mapping for Microsoft Entra ID to piplanning.io Teams you need to execute the following steps:
Navigate to Microsoft Entra ID -> App registrations -> <
Entra App Name
> -> Token configuration.Click on Add group claim and select the
Groups assigned to the application (recommended for large enterprise companies to avoid exceeding limit on the number of groups a token can emit)
option. Click Add.Navigate to Microsoft Entra ID -> App registrations ->
<Entra App Name>
-> Manifest.Find
optionalClaims
and modify theidToken
property to includecloud_displayname
underadditionalProperties
. Click Save.Navigate to Microsoft Entra ID -> Enterprise applications ->
<Entra App Name>
-> Manage -> Users and groups.Click on the Add user/group button and select all groups you want to map to the piplanning.io Teams.
Back in the RTE Cockpit, navigate to Organizations -> Teams and select a Team you want to map to the respective Microsoft Entra ID group.
Click Edit Team button and select the OpenID Connect Group tab at the bottom. Fill in the Group name field. Click Save.
NOTE: If Group mapping does not work as expected, in Entra ID try to edit the Groups Claim in the Token configuration. Click Edit Groups Claim, select ID in Customize token properties by type and select sAMAAccountName. Click Save. After that perform the steps from Step (list item) #5 again.
FAQ
Q: During login, I get the error: A request to the OpenID Connect Token API has failed. Unable to complete this login request" [Backend error: AADSTS700025 - invalid_client]
A: Make sure you have selected Web
(instead of single page application
) for the redirect URI in Azure.