Unlock a world of possibilities! Login now and discover the exclusive benefits awaiting you.
May 13, 2024 1:21:30 AM
Jan 11, 2021 8:55:44 AM
This article provides step-by-step instructions for implementing Azure AD as an identify provider for Qlik Cloud. We cover configuring an App registration in Azure AD and configuring group support using MS Graph permissions.
It guides the reader through adding the necessary application configuration in Azure AD and Qlik Sense Enterprise SaaS identity provider configuration so that Qlik Sense Enterprise SaaS users may log into a tenant using their Azure AD credentials.
Content:
Throughout this tutorial, some words will be used interchangeably.
The tenant hostname required in this context is the original hostname provided to the Qlik Enterprise SaaS tenant.
Copy the "value of the client secret" and paste it somewhere safe.After saving the configuration the value will become hidden and unavailable.
In the OpenID permissions section, check email, openid, and profile. In the Users section, check user.read.
Failing to grant consent to GroupMember.Read.All may result in errors authenticating to Qlik using Azure AD. Make sure to complete this step before moving on.
In this example, I had to change the email claim to upn to obtain the user's email address from Azure AD. Your results may vary.
While not hard, configuring Azure AD to work with Qlik Sense Enterprise SaaS is not trivial. Most of the legwork to make this authentication scheme work is on the Azure side. However, it's important to note that without making some small tweaks to the IdP configuration in Qlik Sense you may receive a failure or two during the validation process.
For many of you, adding Azure AD means you potentially have a bunch of clean up you need to do to remove legacy groups. Unfortunately, there is no way to do this in the UI but there is an API endpoint for deleting groups. See Deleting guid group values from Qlik Sense Enterprise SaaS for a guide on how to delete groups from a Qlik Sense Enterprise SaaS tenant.
Qlik Cloud: Configure Azure Active Directory as an IdP
Hi Jeff,
I hope all is well. Awesome guide, we set this up a couple of months ago and got it to work. We intended to sync multicloud to a onprem solution (where we have SAML auth). In general, works fine, but when we use the QSEoCS at x.eu.qlikcloud.com there is no identity mapping from the on-prem solution. So users exists with the same credentials (sub) as DOMAIN\user@domain.com on both on-prem and cloud, but when deploying apps to a cloud environment the apps don't get any ownership, which is a bit annoying. When setting up the idp on QSEoCS it actually says "The email claim is not valid. The identity mapping feature will not work for the users in the tentant" which would explain the behavior. Any idea of a workaround to actually hard-core/manually add the claim "email_verified" as true? It appears to be the only thing missing.
Cheers,
Erik
Very similar issue as @ergustafsson ...
We are working through changing a customer from one Azure AD tenant to another. Changing IdP in QSEoCS is apparently fairly seamless as long as the email addresses of the new & old users match. However with this config, the email addresses, whilst passed in the authentication process, don't show in the user list and this seems to be a problem. I assume this must be to do with the missing email_verified field. Is there any way to manually add a mapping for this like you would with SAML or similar? I find it weird there's no box to map a claim to that field - although perhaps since it's part of the underlying OpenID Connect spec it's meant to be included by default.
Does anyone was able to retrieve users email and picture from the azure AD?
@sfbi No - I wasn't able to get email address or picture. The email address appears to be to do with the lack of email_verified field coming from Azure. I haven't managed to figure out if it's possible to send a static value as part of the auth process for this, so email addresses can show in QSE SaaS... As for pictures, I haven't looked but assume it's a similar issue with it not being passed by Azure.
I wasn't either. I added a support case but nothing they could do, so I added an idea. Feel free to upvote it:
https://community.qlik.com/t5/Ideas/Modify-claims-in-Identity-Mapping/idi-p/1723386
If you have any input on the actual "idea", please let me know.
Cheers
@ergustafsson and @AlexOmetis I've been trying to figure out if there is a way in Azure to add an email_verified claim. And I found one! But... it adds a prefix in the claim name "extn." Here's the document: https://docs.microsoft.com/en-us/powershell/azure/active-directory/using-extension-attributes-sample...
@ergustafsson I commented on your idea and it's a good place to put it.
This issue along with groups is aggravating for me as much as I know it is for you. We are researching what the art of the possible is without a large amount of customization per IdP.
I hate to say stay tuned so I'll say "keep a sharp eye". If you see something that may work let me know!
Email:
I was able to get the email with "email" claim. Still, IDP config won't create user with the current email. All auth user emails are set as null.
Profile Picture:
It look likes azure ad doesn't support profile picture as claim.
https://stackoverflow.com/questions/39936877/microsoft-openid-login-flow-picture-access
picturePhoto is supported using MicrosoftGraph only:
https://graph.microsoft.com/v1.0/me/photo/$value
have no idea on how to get it working on IDP...
@Jeffrey_Goldberg
I suggest you to add at the top of this How To, the advise about SESSION ACCESS... it is an important step that is described on help, but some people (like myself) might ignore prior to implement the IdP.
@sfbi if I play it back you mean changing the SUB to something a bit more friendly than the actual subject. Like Email or something else. Good feedback to add to the considerations section.
thanks,
jg
@Jeffrey_Goldberg
Here is an example on Users MC page. The first line is the new user create from the Azure AD IdP (no email) and the second line is the "old" QlikID user created before implement the IdP...
It's not affecting the usability, but when you need to add a lot of users, it might get a lit bit complicated to manage it by users Names instead users Emails.
What I don't understand is why I'm getting the email from the email claim, and its not been set as user email on the MC User page.
Also, I added the folowing API permissions at Azure AD.
Thank you