Setup Azure AD with OpenID Connect

Created by Tass Skoudros, Modified on Fri, 21 Apr, 2023 at 6:12 AM by Tass Skoudros

From the Servana Identity Service.


Step-1: Navigate to Identity Providers and choose OpenId Connect v1.0 from the list.

Step-2: 

  1. Change the Alias to Azure AD so your teams recognise it.
  2. Copy the Redirect URI
  3. Toggle Store Tokens
  4. Toggle Stored Tokens Readable


Azure End: 

Step-3: Create an Azure Application Registration for the Jenkins Service (in App Registration)—reference Document link. Ensure the redirect URI copied in step-2 is added for the new application.

Step-4: Create a Client Secret for the newly registered application. Reference Document link


Servana Identity Service:

Step-5: 

  1. Enter the Client ID of the new application created in Azure(Step-4).
  2. Enter the Client Secret created in (Step-5), leave the rest default, and click on save.
  3. Change Client Authentication to 'Client secret send as post.'
  4. Enter the Azure AD Token URL.
  5. Enter the Azure AD Authorisation URL.



Once done, you can set up mappers to import groups from Azure and automatically manage User onboarding.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article