You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ROOT/pages/authentication-authorization/index.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Controls authentication and authorization through external security software suc
36
36
A description of the LDAP plugin using Active Directory is available in xref:authentication-authorization/ldap-integration.adoc[Integration with LDAP directory services].
37
37
38
38
*Single sign-on provider*::
39
-
Integration with a single sign-on service, such as Okta, Auth0, or Azure Active Directory to provide centralized authentication and authorization for all your systems.
39
+
Integration with a single sign-on service, such as Okta, Auth0, or Microsoft Entra ID to provide centralized authentication and authorization for all your systems.
40
40
Neo4j supports the popular OpenID Connect mechanism for integrating with identity providers.
41
41
The configuration steps are described in xref:authentication-authorization/sso-integration.adoc[].
Copy file name to clipboardExpand all lines: modules/ROOT/pages/authentication-authorization/sso-integration.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@
3
3
= Single sign-on integration
4
4
:description: This page describes Neo4j support for integrating with SSO identity providers using OpenID Connect.
5
5
6
-
Neo4j supports OpenID Connect (OIDC), which allows for integration with many identity providers including Okta, Microsoft Azure Active Directory, and Google.
6
+
Neo4j supports OpenID Connect (OIDC), which allows for integration with many identity providers including Okta, Microsoft Entra ID, and Google.
7
7
This integration permits federated users, managed by the identity provider, to access Neo4j instead of, or in addition to the native users and roles.
8
8
For examples with different providers and troubleshooting, see the xref:tutorial/tutorial-sso-configuration.adoc[SSO configuration tutorial].
Copy file name to clipboardExpand all lines: modules/ROOT/pages/tutorial/tutorial-sso-configuration.adoc
+23-23Lines changed: 23 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ For example:
19
19
20
20
SSO works in the following way:
21
21
22
-
. The server (Neo4j DBMS) contacts the identity provider (Okta, Azure, Google, etc.) and fetches the JSON Web Keys (JWKs) from the provider.
22
+
. The server (Neo4j DBMS) contacts the identity provider (Okta, Entra ID, Google, etc.) and fetches the JSON Web Keys (JWKs) from the provider.
23
23
. The client (e.g., Bloom, Neo4j Browser, etc.) asks the user for credentials and contacts the identity provider.
24
24
. The identity provider responds with a JSON Web Token (JWT), a JSON file containing fields (claims) relative to the user (email, audience, groups, etc.).
25
25
. The client provides the server with the JWT, and the server verifies its signature with the JWKs.
The redirect URI `http://localhost:7474/browser/?idp_id=azure&auth_flow_step=redirect_uri` is the URI that will accept returned token responses after successful authentication.
. Configure Neo4j to use Azure authentication by configuring the following settings in the _neo4j.conf_ file:
213
+
. Configure Neo4j to use Entra ID authentication by configuring the following settings in the _neo4j.conf_ file:
214
214
+
215
215
[source, properties]
216
216
----
@@ -234,33 +234,33 @@ For details, see https://learn.microsoft.com/en-us/azure/active-directory/develo
234
234
dbms.security.oidc.azure.claims.username=sub
235
235
----
236
236
237
-
==== Map Azure groups to Neo4j roles
237
+
==== Map Entra groups to Neo4j roles
238
238
239
-
Decide whether you want to use Azure AD Groups directly or Azure App Roles.
239
+
Decide whether you want to use Entra groups directly or Entra App Roles.
240
240
241
-
Using AD Groups directly might be convenient if you already have users assigned to relevant AD Groups and want to perform Group-to-Role mapping in Neo4j settings.
241
+
Using Entra groups directly might be convenient if you already have users assigned to those groups and want to perform Group-to-Role mapping in Neo4j settings.
242
242
243
-
Azure App Roles allow a layer of separation between Neo4j roles and AD Groups.
243
+
Entra App Roles allow a layer of separation between Neo4j roles and groups.
244
244
When App Roles are used, only the roles relevant to Neo4j are sent in the JWT token.
245
245
This prevents leaking permissions between applications.
246
246
JWT tokens also have a limitation of 200 roles per token per user, which can be avoided by sending only the relevant App Roles.
247
247
248
-
Details about Azure App Roles can be found in the https://learn.microsoft.com/en-us/azure/active-directory/develop/howto-add-app-roles-in-azure-ad-apps[Microsoft documentation].
248
+
Details about Entra ID App Roles can be found in the https://learn.microsoft.com/en-us/entra/identity-platform/howto-add-app-roles-in-apps[Microsoft documentation].
249
249
250
-
==== Using Azure AD Groups directly
250
+
==== Using Entra groups directly
251
251
252
-
. Configure the server to return the AD Group Object IDs in the JWT identity tokens.
252
+
. Configure the server to return the Group Object IDs in the JWT identity tokens.
253
253
To do this, set `groupMembershipClaims` to `SecurityGroup` in the Manifest of the registered application:
254
254
+
255
-
image::sso-configuration-tutorials/oidc-azure-server-claims.png[title="Azure OIDC server claims"]
255
+
image::sso-configuration-tutorials/oidc-azure-server-claims.png[title="Entra OIDC server claims"]
256
256
257
-
. Create groups in the Azure AD console and assign users to them.
257
+
. Create groups in the Entra AD console and assign users to them.
258
258
Take note of the Object Id column.
259
259
In the next step, you must map these to user roles in the Neo4j settings.
260
260
+
261
-
image::sso-configuration-tutorials/oidc-azure-server-groups.png[title="Azure OIDC server groups"]
261
+
image::sso-configuration-tutorials/oidc-azure-server-groups.png[title="Entra OIDC server groups"]
262
262
263
-
. Configure a mapping from Azure Ad Group Object IDs to Neo4j roles.
263
+
. Configure a mapping from Entra Group Object IDs to Neo4j roles.
264
264
For details, see xref:authentication-authorization/sso-integration.adoc#auth-sso-map-idp-roles[Map the Identity Provider Groups to the Neo4j Roles].
0 commit comments