Configure Microsoft Entra ID (formerly Azure AD) as a Keycloak Identity Provider
This section outlines the steps to configure a Microsoft Entra ID connector app for DSPM federated access. This setup allows users to access the Forcepoint DSPM UI using Microsoft authentication through Entra ID.
Steps
- Log in to Entra ID (https://portal.azure.com) as an administrator that has permissions to create an App Registration in Entra ID.
-
Navigate to Azure Services > App Registrations. The App Registration page opens.
-
Locate and click New registration from on the top left of the App registrations page.
-
On the Register an application page:
- Provide a name for the application for later identification. For example, DSPM Azure Ad AuthN.
- For Supported account types, choose Accounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant).
-
Leave all other settings as default and click Register.
-
Obtain the application Client ID by navigating to the application’s Overview page. Locate and copy the Application (client)
ID value and save it for a later step.
-
Configure the application OAuth client secret to authorize DSPM with Entra ID:
-
From the application registration page for the application created in step 4c, navigate to Manage > Certificates & secrets.
-
From the Client secrets tab, click + New Client Secret.
-
Enter a client secret description and configure the expiration period or leave as the recommended default of 180 days (6 months).
Click Add.
-
Copy the newly generated client secret Value and place in a safe location for a later step.
Note: A new client secret can be generated if needed.
-
From the application registration page for the application created in step 4c, navigate to Manage > Certificates & secrets.
-
Configure Entra ID as a Keycloak Identity Provider (IdP):
- Sign in to Keycloak Access Management as an administrator and navigate to Identity Providers from the left menu.
-
On the identity Providers page, locate Social > Microsoft.
- From the Keycloak Add Microsoft provider page, copy and paste the Client ID and Client Secret created in step 5 and step 6d respectively.
-
Locate and copy the Redirect URI from the Keycloak Add Microsoft provider page.
-
Return to the Entra ID App registration Overview page and locate the Redirect URI > Add a Redirect URI link.
-
Under Platform configurations, locate the Web Redirect URIs section and click Add URI. Paste the Redirect URI
obtained in step 7d.
Click Save.
-
Test the functionality:
-
Open a new browser session such as a Private or Incognito mode and browse to the DSPM UI login page.
A new sign in option is now available under the Username and Password login fields:
-
Click the Or sign in with Microsoft tile. The browser redirects to the Microsoft login page.
- Upon first successful authentication with Entra ID credentials, Keycloak will automatically link an existing Keycloak user identity upon successful attribute match (most commonly userPrincipalName).
- If a Keycloak user identity is not matched, Keycloak will create the user identity automatically.
-
Open a new browser session such as a Private or Incognito mode and browse to the DSPM UI login page.