This gist assumes a working Azure AD (not Azure AD-DS is already up and fully configured) This gist assumes working DNS / name resolution on your internal network.
this gist is part of this series
All of these steps will be done in the Azure Portal AAD UI
- Select App Registration from the nav bar
- Click new registration in the task pane
- name it
proxmox
- set initial redirect URI to web https://node.mydomain.com:8006 (this assume you are not publishing externaly)
- click register
nav should change to the the proxmox app reg
- click certificans & secrets
- click the client secrets tab
- click new client secret
- set description to say proxmox-auth
- set expires to 730 days
- copy the value
- copy the secret id )
very important - you will never see the value again - must copy it down now
- click authentication in the left nav
- add all the internally and externally accessible node names, in my case this is as follows for my 3 internal node names, the pbs server name and cluster name via internal nginx.
https://pve1.mydomain.com:8006
https://pve2.mydomain.com:8006
https://pve2.mydomain.com:8006
https://pbs.mydomain.com:8007
https://cluster1.mydomain.com
- nothing else needs to be changed here so click save once these have been added 17 navigate to overview > endpoints 18 Copy the OpenID Connect metadata document link and remove /.well-known/openid-configuration this part from the link, so you end up with something like this https://login.microsoftonline.com/{Your-Tenant-ID}/v2.0
- go to
datacenter > realms
clickadd
at the top of page and selectOpenID Connect Server
- issuer URL = https://login.microsoftonline.com/{Your-Tenant-ID}/v2.0
- realm is domain name
- client ID = GUID (from AAD app reg > proxmox > overview > application (client ID)
- client key = hashed value (should be the secret value from earlier)
- default = checked
- autocreate users = checked
- username claim = email or username (it gives same result in my system - the username will alwasy be [email protected])
- click
datacenter > permissions > groups>
- click
create
- name = admins
- click
create
- click
datacenter > permissions
- click
add
- path = /
- group = admins
- role = administrator
- propogate = checked
- user name = [email protected]
- realm = Azure AAD
- Group = Admins
- name = folks names of course
- email = ususally the same as [email protected]