Azure Active Directory

With federated login via Azure Active Directory, you can allow your organization’s users to sign into MyEnergyCAP and EnergyCAP with their on-premises credentials. If a user doesn’t currently exist in MyEnergyCAP, a user is automatically created the first time the user authenticates. A ‘default’ role (limited permissions) is assigned to this user so it is recommend to change their permissions role to the correct role in EnergyCAP as soon as possible.

Instructions

  1. Go to Azure Active Directory (https://aad.portal.azure.com)

  2. Click on ‘Enterprise applications Azure AD

  3. Click on ‘New application’ Azure AD

  4. Click on ‘Non-gallery application’ Azure AD

  5. Enter ‘MyEnergyCAP’ for Name Azure AD

  6. Configure single-sign on for the new application Azure AD

  7. Set the Mode to ‘SAML-based Sign-on’ Azure AD

  8. Set the Identifier to ‘https://auth-dev.energycap.com/auth/realms/myenergycap'

  9. and the Reply URL to the provided URL. An example Reply URL is:‘https://auth-dev.energycap.com/auth/realms/myenergycap/broker/{id}/endpoint' Azure AD

  10. The User identifier should be set to ‘user.userprincipalname’

  11. Click on ‘View and edit all other user attributes’. Add the following claims and their values:

  12. Create a new certificate if one is not active

  13. Download the Metadata XML and forward this to your EnergyCAP project manager Azure AD