Unlock a world of possibilities! Login now and discover the exclusive benefits awaiting you.
May 13, 2024 1:21:30 AM
Jan 11, 2021 8:55:44 AM
This article provides step-by-step instructions for implementing Azure AD as an identify provider for Qlik Cloud. We cover configuring an App registration in Azure AD and configuring group support using MS Graph permissions.
It guides the reader through adding the necessary application configuration in Azure AD and Qlik Sense Enterprise SaaS identity provider configuration so that Qlik Sense Enterprise SaaS users may log into a tenant using their Azure AD credentials.
Content:
Throughout this tutorial, some words will be used interchangeably.
The tenant hostname required in this context is the original hostname provided to the Qlik Enterprise SaaS tenant.
Copy the "value of the client secret" and paste it somewhere safe.After saving the configuration the value will become hidden and unavailable.
In the OpenID permissions section, check email, openid, and profile. In the Users section, check user.read.
Failing to grant consent to GroupMember.Read.All may result in errors authenticating to Qlik using Azure AD. Make sure to complete this step before moving on.
In this example, I had to change the email claim to upn to obtain the user's email address from Azure AD. Your results may vary.
While not hard, configuring Azure AD to work with Qlik Sense Enterprise SaaS is not trivial. Most of the legwork to make this authentication scheme work is on the Azure side. However, it's important to note that without making some small tweaks to the IdP configuration in Qlik Sense you may receive a failure or two during the validation process.
For many of you, adding Azure AD means you potentially have a bunch of clean up you need to do to remove legacy groups. Unfortunately, there is no way to do this in the UI but there is an API endpoint for deleting groups. See Deleting guid group values from Qlik Sense Enterprise SaaS for a guide on how to delete groups from a Qlik Sense Enterprise SaaS tenant.
Qlik Cloud: Configure Azure Active Directory as an IdP
@lmcsedyz Thank you for the response, so in that case your external users (Guests) are in your Azure AD instead AAD B2C? I have a situation where Client wants to migrate this external users from Internal AAD to AADB2C and not keep them in AAD anymore (They have multiple subdomains and each have their own Group of external users). Did you use "Any Microsoft Entra Id Multi-tenant" when bringing them in ?
Hi @RaviGinqo , in our case most of our clients has their own azure AD, so they are invited by us. So it uses B2B. Few clients not. But even their personal Microsoft accounts works same way, and act like B2B (even it is not). I guess there should be no problem to invite users who are AADB2C, but their group settings wont transfer to this "collector" AD. Only name, surname, email, domain username (and origin tenant id of course).
But users has to be also in azure AD, because you need one point, to communicate with (because only one IDP could be used in qlik saas, onpremise could have multiple with multiple proxies).
For test you could create free azure AD (now as Microsoft Entra ID Free license). An try to invite somebody who is in your test B2C. I guess you could have different usernames then emails in B2C. If is that so, when you invite by username you should by sure, it goes through your B2C (and not directly to microsoft account).
But if this B2C will be normally (in you future production environment) linked to your azureAD (to one subscription), you will be able to access all the information together. If you will be able to transfer these users groups to "parent AD" (which will be connected to qlik) from your B2C, your full scenario will be covered. If B2C is not linked with your AD, but you have access to it, you will have to wrote your own script/service running externally to sync these groups (group names mirrors more precisely, there will be no link between them) by API. But is is possible you will have to make this service anyway, even if you will have it linked under one subscription.
Thank you @lmcsedyz I will definitely explore this options and test it out. Appreciate your help on this.
We have users configured on Azure AD as guests for more than a year. But suddenly 2 days back, their authentication started failing with status: 401 detail: could not get Azure AD group name(s). What could have changed to cause this? Im searching Qlik documentation. Any assistance would be appreciated. These users can not be moved to members on the AD.
@Adev if you are not using new Microsoft Graph/Entra, it is the reason. Microsoft just dropped old Azure AD components.
Question: if I configure the IdP, then all Qlik users must created from Azure AD, or is possible to create Qlik Saas users from Qlik, that are not on the AD? Is possible to use the AD IDP only for some users, not for all users?
Tnks
Has anyone managed to get the groups display names in the token?
Can anyone confirm what we do when the Azure AD Secret is about to expire?
Do we just make a new client secret and update the IDP ?
@jsebrightqi , you may try to use API's to update the existing config of identity provider
https://qlik.dev/apis/rest/identity-providers/#patch-v1-identity-providers-id