Zoomed Image

How to Set Up Single Sign-On with Azure AD

xAssets Configuration Guide
How To

How to Set Up Single Sign-On with Azure AD

This page provides a condensed procedure for configuring Azure Active Directory (now Microsoft Entra ID) as the single sign-on provider for xAssets. For full details on each step, see the SSO with Azure reference page.

Prerequisites

  • An Azure Active Directory tenant with Portal administrator access.
  • Configuration-level access to xAssets.
  • The SSOADMIN account created and assigned to the Admins group (see SSO Introduction).

Step 1: Register an Application in Azure

  1. Sign in to the Azure Portal.
  2. Navigate to Azure Active Directory > App Registrations > New Registration.
  3. Name the application (e.g., "xAssets SSO") and click Register.
  4. Copy the Directory (Tenant) ID from the Azure AD overview page.
  5. Copy the Application (Client) ID from the application overview page.

Step 2: Configure the Azure Application

  1. Navigate to Certificates & Secrets > New Client Secret.
  2. Add a description, set an expiration period, and click Add.
  3. Copy the Value immediately -- it is only displayed once.
  4. Navigate to the Authentication page and tick ID tokens under "Implicit grant and hybrid flows".
  5. Under Redirect URIs, add your xAssets URL: https://yourcompany.hosted.xassets.net/a.aspx
  6. Navigate to API Permissions and ensure Microsoft Graph > OpenID and User.Read are granted. Click Grant admin consent if prompted.

Step 3: Create a Credential Pack in xAssets

  1. In xAssets, click Settings (top right) > Credentials.
  2. Click New to create a new credential pack.
  3. Set the type to Single Sign On.
  4. Name the pack Azure.
  5. Fill in the fields:
Field Value
Domain Name Your Azure Tenant ID
Username The Application (Client) ID
Password The client secret Value from Step 2
  1. Save the credential pack.

Step 4: Set the Authentication Type in xAssets

  1. Navigate to Admin > Settings.
  2. Set the setting AUTHENTICATIONID to Azure AD.
  3. Save the setting.

Step 5: Test the Login

  1. Open a new private/incognito browser window.
  2. Navigate to your xAssets URL.
  3. You should be redirected to the Microsoft login page.
  4. After authenticating with Microsoft, you should be returned to xAssets and logged in automatically.

If the login fails, use the direct login URL to bypass SSO for troubleshooting:

https://yourcompany.hosted.xassets.net/a.aspx?logondirect=direct

Important Warnings

  • The redirect URI in Azure must match your xAssets URL exactly, including the protocol (https), domain, and path (/a.aspx).
  • Client secrets have expiration dates. Set a calendar reminder to renew the secret before it expires, or SSO will stop working.
  • When renewing a secret, create the new secret first, update the xAssets credential pack, then delete the old secret.