User Experience
R24 AMR | Min(s) read

Configuring Azure Active Directory (AAD)

To configure AAD,

  1. Login into AAD and search for App registration.
  2. Click the New registration option inside App Registrations.
  3. A screenshot of a computer  Description automatically generated

  4. On the Register an application page, enter the name, select the account type, and click Save. Check with IT or security team if you are not aware of the option.
  5. A screenshot of a computer  Description automatically generated

  6. Note the Application (client) ID, which is used while configuring the transact explorer war file and click Add a Redirect URI to configure redirect URI.
  7. Click Add a Platform and select Web under Configure platforms.
  8. A screenshot of a computer  Description automatically generated

  9. On the Configure Web pane, enter the redirect URI and click Configure. Here, redirect URI is the transact-explorer-wa URL (http://localhost:9089/transact-explorer-wa).
  10. The below options are set by default.

    A screenshot of a computer  Description automatically generated

    A screenshot of a computer  Description automatically generated

Generating Client Secret

To generate client secret,

  1. On the left-navigation pane, click Certificates & Secrets.
  2. Click New client secret.
  3. On the Add a client secret page, enter a description, select the secret value expiry timeline, and click Save. The default value is 6 months.
  4. Copy the value in some text file, as you need them to configure in front-end war. Ensure to copy the value immediately as it will become encoded in a few minutes.
  5. You have now successfully generated the client secret.

Configuring Token

Since Transact Explorer accepts the claim only in Preferred_username format, you need to configure the token for the same.

To configure the token,

  1. Select Token configuration and click Add optional claim.
  2. A screenshot of a computer  Description automatically generated

  3. On the Add optional claim pane, select the ID token type and Preferred_username option, and click Save.
  4. A screenshot of a computer  Description automatically generated A screenshot of a computer  Description automatically generated

    You can view the endpoints from the App Registration home page as shown below.

    To know the endpoints to configure in front end war’s, open the Openid Connect metadata document and note the value.

    You have now successfully configured the token and generated the end points.

Configuring tb-server.war

Perform any one of the below configurations.

  • Enable the JWT token filter in the config.properties file.

  • Set the Dcom.temenos.te.api.enableJWTtokenFilter=true property in the setenv.bat file.
WEB-INF/web.xml

Perform the below configuration in the web.xml file.

  1. Ensure that the classpath:spring-jwt-iris-authenticator.xml parameter is enabled. It is enabled by default.
  2. Uncomment springSecurityFilterChain filter and filter mapping.
WEB-INF/classes/spring-jwt-iris-authenticator.xml

Perform the below configuration in the spring-jwt-iris-authenticator.xml file.

  1. Ensure that the jwtTokenValidationFilter parameter is enabled. It is enabled by default
  2. Comment out the claims as mentioned in the below screenshot.
  3. Set idTokenSigned property to 'true'.
  4. Configure the below options
  5. A computer code with text  Description automatically generated

  6. Make sure idTokenSignedAlg is RS256.

Configuring transact-explorer-wa.war

Perform anyone of the below configuration.

  • Enable the openid filter in the config.properties file.

  • Add the below property in the setenv.bat file.

    -Dcom.temenos.te.ui.enableOpenIdConnectFilter=Y

WEB-INF/classes/spring-oidc-authenticator.xml

Perform the below configuration in the spring-oidc-authenticator.xml file.

  1. Change the value of the serverLogoutParameter property as ‘logouturl’.
  2. Configure the values for below properties from open ID connect metadata configuration from AAD
    • Issuer
    • authzEndpoint
    • tokenEndpoint
    • logoutendpoint
    • pkJwksUri
    • principalClaim – Value should be preferred_username
    • clientId – App Registration client ID from AAD
    • redirectUri – Transact Explorer login URI

    Refer to the Azure Active Directory Open ID metadata information for these details.

  3. Paste the Client secret value from AAD to defaultClientSecretProvider.

Configuring Transact

Create a user profile with the same sign-on name as AAD and make sure the Preauthenticated attribute is added.

Validating SSO AAD Integration

To validate the AAD integration,

  1. Launch Transact Explorer.
  2. Enter the credentials and on successful authentication, the Transact Explorer home page appears.

Copyright © 2020- Temenos Headquarters SA

Published on :
Monday, May 27, 2024 2:04:44 PM IST