-
Notifications
You must be signed in to change notification settings - Fork 10
Spike: log in to local Benefits Admin with Microsoft SSO #3295
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added this just so the login page doesn't look as broken. Aware that we wouldn't want to add a file this large and probably want to clean up the organization of these SSO logo files. Anyways, the styling is not the focus of this spike, please ignore this
Current state
Changes that were neededIn the Microsoft Entra admin centerLogged into entra.microsoft.com with my account in the "Compiler LLC" tenant. Then, under "App registrations":
Then, under "Enterprise apps":
In our Django code
Next stepsIt was easy to add my account to the Enterprise Application's "Users and groups" because the app registration and my user account are in the same tenant. The next step is to figure out how accounts from other tenants are added to that list of users/groups who can authenticate into the app. This is what we'd need to allow transit-agency-staff users to log in using their Microsoft accounts from their Microsoft Entra ID tenants. Some initial notes
With that said about external tenants providing a "cleaner separation", I want to note that it seems you can also do some configuration with the B2B deployment using Microsoft Entra Identity Governance or entitlement management or something? Then there's something about catalogs and connected organizations? This is where I'm kind of reaching the limit of how much new Azure knowledge I can wrap my head around at a time. 😅 |
|
I'll demo this today in dev standup |
3f1194e to
e4616bb
Compare
downloaded the file from https://purepng.com/public/uploads/large/purepng.com-microsoft-logo-iconlogobrand-logoiconslogos-251519939091wmudn.png this is the default value as stated by https://megalus.github.io/django-microsoft-sso/settings/ but our CSP directives currently don't allow the request for that file to go through.
also allow the pre-login hook to run for Microsoft SSO as well
e4616bb to
58a509c
Compare
Research for #2266 and #2263