Unlock a world of possibilities! Login now and discover the exclusive benefits awaiting you.
May 13, 2024 1:21:30 AM
Jan 11, 2021 8:55:44 AM
This article provides step-by-step instructions for implementing Azure AD as an identify provider for Qlik Cloud. We cover configuring an App registration in Azure AD and configuring group support using MS Graph permissions.
It guides the reader through adding the necessary application configuration in Azure AD and Qlik Sense Enterprise SaaS identity provider configuration so that Qlik Sense Enterprise SaaS users may log into a tenant using their Azure AD credentials.
Content:
Throughout this tutorial, some words will be used interchangeably.
The tenant hostname required in this context is the original hostname provided to the Qlik Enterprise SaaS tenant.
Copy the "value of the client secret" and paste it somewhere safe.After saving the configuration the value will become hidden and unavailable.
In the OpenID permissions section, check email, openid, and profile. In the Users section, check user.read.
Failing to grant consent to GroupMember.Read.All may result in errors authenticating to Qlik using Azure AD. Make sure to complete this step before moving on.
In this example, I had to change the email claim to upn to obtain the user's email address from Azure AD. Your results may vary.
While not hard, configuring Azure AD to work with Qlik Sense Enterprise SaaS is not trivial. Most of the legwork to make this authentication scheme work is on the Azure side. However, it's important to note that without making some small tweaks to the IdP configuration in Qlik Sense you may receive a failure or two during the validation process.
For many of you, adding Azure AD means you potentially have a bunch of clean up you need to do to remove legacy groups. Unfortunately, there is no way to do this in the UI but there is an API endpoint for deleting groups. See Deleting guid group values from Qlik Sense Enterprise SaaS for a guide on how to delete groups from a Qlik Sense Enterprise SaaS tenant.
Qlik Cloud: Configure Azure Active Directory as an IdP
@AlexOmetis Thanks re the recovery url. I've just tested and it works great (for me at least). It would still be good to set up Qlik users - fingers crossed it's on a list somewhere...
@DavidFosterVF When I went through the process 2 days ago it was very similar. I believe the AD bit hadn't changed (but someone else did that and I had no visibility), some of the Qlik boxes have slightly different labels but they're in the same place.
Does anyone know if there is a limitation by synchronize groups? I can see groups, but some entries are missing.
Thank you.
Regards
If the user belongs to too many groups, Azure might be truncating the information sent in the handshake process.
You could try to configure the Azure Enterprise App to filter the groups and send only the groups related to the Qlik Sense accesses. This is the way I am using it, as recommended by our Azure admin.
Regards
Fernando
@Alastair_Ometis I have to check. At the moment, only a few users are logged in at SaaS.
Regards
Martin
@Alastair_Ometis A new User has looged in on SaaS but his groups are not available yet. How often the Azure AD is synchronized?
Regards
Once I activate the IdP, will users need to login and create new accounts? - Is there a way to link existing accounts?
@martinpohl you could get the user to login and then go to <tenant>.<region>.qlikcloud.com/api/v1/diagnose-claims
This allows you to view the claim that is being sent for the user to check that the group is coming across correctly.
There is a key step about granting access to graph permissions for Group.membership.readall in the azure ad configruation that if missed will prevent the claim coming across
@ChrisBrannon users will need to login for first time and your Qlik tenant will create an account for them. If you have auto allocate licenses enabled (or have analyzer capacity licesning) they will get access immediately. There is a way to provision the users using an app automation @Anonymous you did something with this didn't you was there a guide?
@ChrisBrannon you also need to ensure that only the relevant users have access to the enterprise app in azure ad otherwise anyone with a valid AZure AD login will be able to get access to the tenant and pick up a license.
Hi,
Just wanted to know what will happen in below scenarios -
1. Total licenses are allocated(no free licenses available) to number of users & new user login via SSO
2. Any possibility to auto-deactivate/auto-delete users which are deleted from Azure AD, so that license can be made free.
3. Any user from Azure AD is login by mistake who is not suppose to login, but since he is authorized user from Azure AD, he will get license allocated by default. How to identify & prevent licenses allocation from such unauthorized users.
Hello @prashantbaste
1. The user should get a License required message
2 and 3: These are not currently functionalities in the product. I would recommend logging an idea for it!
All the best,
Sonja