Azure (Entra) setup
Follow these steps to set up Azure as an SSO provider for the Tipalti app.
- Log in to your Azure account.
Use the same email you use to log into Tipalti
- Under Azure services, click Microsoft Entra ID.
The company details display.
Before you begin, have a secured text password-sharing application (for example, 1Password) ready to paste your app registration details in to share with Tipalti.
-
Click App registrations in the left menu. Then, click + New registration in the top tab menu.
The Register an application page displays.
-
Complete the form:
- In the Name field, enter the name of the application.
- In the Supported account types field, select Accounts in this organizational directory only (tipalti.com only - Single tenant).
-
Scroll down to the Redirect URI section.
- From the Select a platform dropdown, select Web.
- Copy and paste the following URLs for the Tipalti app.
- For Sandbox:
- https://console2.sandbox.tipalti.com/api/v0/account/authorizesso
- https://sso.sandbox.tipalti.com/api/authorization/v1/authorizesso
- For Production:
- https://hub.tipalti.com/api/v0/account/authorizesso
- https://sso.tipalti.com/api/authorization/v1/authorizesso
- For Sandbox:
- Click Register.
- Click Authentications in the left menu:
-
In the Web section, click Add URl.
-
Copy and paste a second URl (for the selected environment).
- For Sandbox:
- https://console2.sandbox.tipalti.com/api/v0/account/authorizesso
- https://sso.sandbox.tipalti.com/api/authorization/v1/authorizesso
- For Production:
- https://hub.tipalti.com/api/v0/account/authorizesso
- https://sso.tipalti.com/api/authorization/v1/authorizesso
- For Sandbox:
- Click Add URI.
-
Click Save.
-
- Click Certificates & secrets in the left menu.
- In Client secrets, click + New client secret.
The Add a client secret right panel displays.
-
Complete the fields:
-
In the Description field, enter a description for this client secret.
-
Select the expiration period from the Expires dropdown based on your company policy. We recommend 365 days (12 months).
-
Click Add.
The new client secret displays.
Once you leave the page, the value is no longer visible..
-
Paste and save the value to a secured text password-sharing application of your choice.
To complete the setup process, you need to provide Tipalti with the application registration details you generated in Azure using your secured text password-sharing application.
To get your Application (client ID) and OpenID Connect metadata document endpoint:
- Send the document to Tipalti through the secured text password-sharing application. Check the document contains the app:
Tipalti sends you a confirmation email when they receive these details. The SSO configuration is now complete.
-
Destroy the document as soon as you receive this confirmation.
Comments
0 comments
Please sign in to leave a comment.