Azure AD (Microsoft Entra ID) Setup
1. Register App
- Microsoft Entra admin center:
Applications > App registrations > New registration. - Add redirect URI:
- OIDC:
https://<your-host>/auth/oidc/callback - SAML ACS (if using SAML):
https://<your-host>/auth/saml/acs
- OIDC:
- Save
Application (client) IDandDirectory (tenant) ID.
2. Configure OIDC in Triage Warden
Set:
TW_OIDC_ISSUER=https://login.microsoftonline.com/<tenant-id>/v2.0TW_OIDC_CLIENT_ID=<application-client-id>TW_OIDC_CLIENT_SECRET=<generated-client-secret>TW_OIDC_REDIRECT_URI=https://<your-host>/auth/oidc/callbackTW_OIDC_SCOPES=openid,profile,emailTW_OIDC_REQUIRE_MFA=true(recommended)
3. Claims and Group Mapping
- In app
Token configuration, add group claims. - Map groups to roles:
TW_SSO_ROLE_MAPPING=SOC-Admins=admin,SOC-Analysts=analyst,SOC-Viewers=viewer
4. Conditional Access / MFA
- Create conditional access policy requiring MFA for the app.
- Keep
TW_OIDC_REQUIRE_MFA=trueto enforce server-side claim checks.