# Azure AD - OIDC Setup

The Azure AD SSO integration allows for a centralised and secure login process for businesses that utilise Azure AD as their identity provider.&#x20;

OICD allows you to set up an application in AzureAD to manage access to accounts in Hava.

## Step by step guide

### 1. Go to Account Settings

On the top right, press the account preferences icon <img src="/files/NjXYp0bOGCrZMglWtiQP" alt="" data-size="original"> and select account settings from the drop-down menu

![Open Your Account Settings](/files/dZZ2sQRyx3gV9lpFiJON)

### 2. Select SSO Config&#x20;

From the menu on the left, select SSO Config to bring up the SSO Configuration screen

![Select SSO Config](/files/V3RsNAzOpeFbtC3dv1cp)

### 3. Select OIDC

Azure AD can use SAML or OIDC as the way to integrate their identity platform with Hava. From the two choices ('SAML' and 'OIDC') select OIDC.

![](/files/Uw6Poumio6ZBkHf5RMx3)

### 4. Take note of the Service provider details

You should be presented with a screen showing you two sections, Identity Provider, and Service Provider. In this case the Identity Provider is represented by Azure AD and the Service Provider is Hava.&#x20;

Take note of the `Sing-in Redirect URL` attribute in the Service Provider section, as we will use these when setting up Azure AD.

<figure><img src="/files/Ek4ZV6IV4yyMC3J3ma0j" alt=""><figcaption></figcaption></figure>

### 5. Navigate to Azure Active Directory

In the Azure Portal, go to the Azure Active Directory service, and select `App registrations` from the menu on the left side.

<figure><img src="/files/B1nJnfK8YN0jC5u2FOhX" alt=""><figcaption></figcaption></figure>

### 6. Start creating a new registration

Click the `New registration` button on the top of the screen to start the process for setting up a new application registration.

<figure><img src="/files/0cIVwUVZrkMS10eV94Fc" alt=""><figcaption></figcaption></figure>

### 7.  Register Application

You will be presented with a form where we will configure two values:

* Give the application a name that people will recongnize (e.g. hava.io)
* In the optional `Redirect URI`
  * Select `Web` as the platform
  * And put in the `Sign-in Redirect URL` from the Hava OIDC configuration screen

Finally press `Register` on the bottom of the form. Leave the other values as they are.

<figure><img src="/files/hiSDAfAFx6Jj9wFptqI0" alt=""><figcaption></figcaption></figure>

### 8. Create a secret

Next we need to create a secret to secure the connection between Hava and AzureAD.

On the left menu, select `Certificates & secrets` and then under `Client secrets` click `New client secret`

<figure><img src="/files/ZdQWviZuQMAobNz4OnSu" alt=""><figcaption></figcaption></figure>

### 9. Configure and Save secret

In the pane that opens, give the secret a descriptive name and select the expiry for the key

Press Add to save the secret.

<figure><img src="/files/rRFG7hTb2GkddHhYvxt9" alt=""><figcaption></figcaption></figure>

### 10. Save the secret key

The `value` attribute contains the secret key that we need to provide to Hava, save that. Ignore the `Secret ID` , we will not be using that.

<figure><img src="/files/PaQDKGE64LGviieYM7FY" alt=""><figcaption></figcaption></figure>

### 11. Get Application Details

On the overview page there are two values we will need.

Save the `Application (client) ID` and the `Directory (tenant) ID` values, we will use those in the next step

<figure><img src="/files/KdBsmN0joWnS9woKXsIr" alt=""><figcaption></figcaption></figure>

### 12. Configure OIDC

Go back to Hava and press the `Add OIDC Config` button

In the form that comes up add these values:

* **Identity Provider Host:** `login.microsoftonline.com/TENANT_ID/v2.0` where `TENANT_ID` is substituted with the `Directory (tenant) ID` from step 11
* **OIDC Client Id:&#x20;**&#x20;`Application (client) ID` from step 11
* **OIDC Client Secret:** `value` from step 10

Press `Save` to save the configuration.

<figure><img src="/files/Pf7GV34oKyvOOhDCma4H" alt=""><figcaption></figcaption></figure>

### 13. Enable Configuration

Last step is to press the green `Enable` button on the OIDC Configuration page. Once this is done, you are ready to test the SSO integration from Azure AD.

<figure><img src="/files/F2QbYruvCeDPNSc0N9jB" alt=""><figcaption><p>Enable SSO</p></figcaption></figure>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.hava.io/collaboration/sso-saml/azure-ad-oidc-setup.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
