Unlock a world of possibilities! Login now and discover the exclusive benefits awaiting you.
May 13, 2024 1:21:30 AM
Jan 11, 2021 8:55:44 AM
This article provides step-by-step instructions for implementing Azure AD as an identify provider for Qlik Cloud. We cover configuring an App registration in Azure AD and configuring group support using MS Graph permissions.
It guides the reader through adding the necessary application configuration in Azure AD and Qlik Sense Enterprise SaaS identity provider configuration so that Qlik Sense Enterprise SaaS users may log into a tenant using their Azure AD credentials.
Content:
Throughout this tutorial, some words will be used interchangeably.
The tenant hostname required in this context is the original hostname provided to the Qlik Enterprise SaaS tenant.
Copy the "value of the client secret" and paste it somewhere safe.After saving the configuration the value will become hidden and unavailable.
In the OpenID permissions section, check email, openid, and profile. In the Users section, check user.read.
Failing to grant consent to GroupMember.Read.All may result in errors authenticating to Qlik using Azure AD. Make sure to complete this step before moving on.
In this example, I had to change the email claim to upn to obtain the user's email address from Azure AD. Your results may vary.
While not hard, configuring Azure AD to work with Qlik Sense Enterprise SaaS is not trivial. Most of the legwork to make this authentication scheme work is on the Azure side. However, it's important to note that without making some small tweaks to the IdP configuration in Qlik Sense you may receive a failure or two during the validation process.
For many of you, adding Azure AD means you potentially have a bunch of clean up you need to do to remove legacy groups. Unfortunately, there is no way to do this in the UI but there is an API endpoint for deleting groups. See Deleting guid group values from Qlik Sense Enterprise SaaS for a guide on how to delete groups from a Qlik Sense Enterprise SaaS tenant.
Qlik Cloud: Configure Azure Active Directory as an IdP
Hi community,
First time caller, long time listener!
My company has Qlik multicloud and I am trying to get SaaS more comprehensively set up.
As per this guide, we have our azure tenant enterprise app configured and linked to Qlik SaaS, however due to LDAP on prem and Azure AD in the Cloud, we are also experiencing the issue of multi license consumption, as mentioned in this forum.
Does anyone have any more comprehensive guide on setting up a custom claim in Azure, or are you using any other method such as ADFS? Our teams here do not have a huge experience in Azure, so this piece is proving very challenging.
/Andy
@andrew_thomson - I wrote up our approach in some detail here. It was in a clean environment so I was able to use FAKEDOMAIN\email@address.com as the domain/realm and user ID in both on-prem and SaaS.
If you need the SaaS edition to show DOMAIN\user.name to match existing users then a custom attribute is your only way (unless you want to run scripts in the repository to update users when you move them to this new authentication). I managed to get this working but it needed a PowerShell command running each time a new user was added to populate the custom attribute. I decided it was simpler to just use email address to avoid needing to do this.
Thanks @AlexOmetis I think I had seen your blog post in my own research, so thank you very much.
I do think the custom claim may be the way I'll have to go.
The added complication I've thought about since, is that we have multiple Azure domains we will have to contend with since our company and IT department essentially operate as a shared service for a couple of domains, due to various acquisitions etc.
Has anyone had any experience in this area, with multi Azure Domains alongside on-prem LDAP ?
@andrew_thomson I think the advice I've seen elsewhere is to use something that will allow you to integrate those Azure Domains into a single IdP - e.g. Auth0 / Okta - and then integrate Qlik Sense with that as Qlik Sense SaaS can only handle one Interactive IdP.
I am getting the groups from azure ad after configuring idp as azure ad. But when I assign that group to a particular permission say Developer, then when I see in the users section, the members of that groups are not getting that developer role.
Same is happening for assigning members to a space. When I assign a group to a space, its members are not getting the space access.
And how much time it takes to sync the groups with qlik sense to azure ad if some changes have been made on azure ad.
Pls suggest
@Jeffrey_Goldberg Great article and video - thanks. I've just done my first setup of a client on Saas with Azure AD, and we are wondering if we can also use Qlik logins in addition to AD? There are some users that are not in the client organisation who need access and it's easier if they manage their own accounts.
Haven't seen anything positive in this regard yet, but hoping it might be there somewhere.
Thanks,
Jon.
@jsebrightbme the way I've handled that is by setting up guest accounts in Azure AD. You don't need licences for those users... but would be nice to have multiple IdPs as an option...
@AlexOmetis - thanks for that. Yes, they're looking at some limited licences in Azure for some users. The ability for me to carry on with my Qlik account would have helped as the Azure AD isn't fully built yet. I've managed to avoid locking myself out so far - the ability to turn it on & off is helpful - just a bit of caution required at the moment.
@jsebrightbme the SAO and possibly any other Qlik-login users can use the /login/recovery URL... although you may have to be a TenantAdmin for that.
Can I ask if the tutorial has been updated to match the current (i.e. as @ June-2022) version of this process?