Updated readme, added setup instructions, updated ARM template for preauth app secret

This commit is contained in:
Brett Hacker 2017-04-02 22:58:33 -07:00
Родитель c462de22e5
Коммит 432b479145
16 изменённых файлов: 106 добавлений и 4 удалений

Просмотреть файл

@ -12,6 +12,7 @@ Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "Solution Items", "Solution
azuredeploy.parameters.json = azuredeploy.parameters.json
CustomDeploy.ps1 = CustomDeploy.ps1
README.md = README.md
Setup.md = Setup.md
EndProjectSection
EndProject
Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "AzureB2BInvite", "AzureB2BInvite\AzureB2BInvite.csproj", "{945D0FB2-77C0-4236-B742-15296CE42DC9}"
@ -20,6 +21,11 @@ Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "B2BPortal.Data", "B2BPortal
EndProject
Project("{FAE04EC0-301F-11D3-BF4B-00C04F79EFBC}") = "B2BPortal.Interfaces", "B2BPortal.Interfaces\B2BPortal.Interfaces.csproj", "{C63718DC-92B5-46B9-B340-C0C8C23C649D}"
EndProject
Project("{2150E333-8FDC-42A3-9474-1A3956D46DE8}") = "DocImages", "DocImages", "{EDF300F8-9691-461E-A7E2-D376335D3257}"
ProjectSection(SolutionItems) = preProject
DocImages\App1.png = DocImages\App1.png
EndProjectSection
EndProject
Global
GlobalSection(SolutionConfigurationPlatforms) = preSolution
Debug|Any CPU = Debug|Any CPU
@ -46,4 +52,7 @@ Global
GlobalSection(SolutionProperties) = preSolution
HideSolutionNode = FALSE
EndGlobalSection
GlobalSection(NestedProjects) = preSolution
{EDF300F8-9691-461E-A7E2-D376335D3257} = {9AFBD835-1D40-4F5A-A575-65A4FB0D2D63}
EndGlobalSection
EndGlobal

Просмотреть файл

@ -4,8 +4,6 @@
http://go.microsoft.com/fwlink/?LinkId=301880
-->
<configuration>
<appSettings configSource="woodbridgesettings.config"></appSettings>
<!--
<appSettings>
<add key="webpages:Version" value="3.0.0.0" />
<add key="webpages:Enabled" value="false" />
@ -36,7 +34,6 @@
<add key="SMTPPort" value="587" />
<add key="MailEnabled" value="1" />
</appSettings>
-->
<system.web>
<customErrors mode="Off" />
<compilation debug="true" targetFramework="4.6.1" />

Двоичные данные
DocImages/ARMDeploy.png Normal file

Двоичный файл не отображается.

После

Ширина:  |  Высота:  |  Размер: 44 KiB

Двоичные данные
DocImages/App1.png Normal file

Двоичный файл не отображается.

После

Ширина:  |  Высота:  |  Размер: 52 KiB

Двоичные данные
DocImages/App1a.png Normal file

Двоичный файл не отображается.

После

Ширина:  |  Высота:  |  Размер: 55 KiB

Двоичные данные
DocImages/App2.png Normal file

Двоичный файл не отображается.

После

Ширина:  |  Высота:  |  Размер: 12 KiB

Двоичные данные
DocImages/App3.png Normal file

Двоичный файл не отображается.

После

Ширина:  |  Высота:  |  Размер: 63 KiB

Двоичные данные
DocImages/App3a.png Normal file

Двоичный файл не отображается.

После

Ширина:  |  Высота:  |  Размер: 22 KiB

Двоичные данные
DocImages/App4.png Normal file

Двоичный файл не отображается.

После

Ширина:  |  Высота:  |  Размер: 32 KiB

Двоичные данные
DocImages/App5.png Normal file

Двоичный файл не отображается.

После

Ширина:  |  Высота:  |  Размер: 27 KiB

Двоичные данные
DocImages/App6.png Normal file

Двоичный файл не отображается.

После

Ширина:  |  Высота:  |  Размер: 50 KiB

Двоичные данные
DocImages/Manifest.png Normal file

Двоичный файл не отображается.

После

Ширина:  |  Высота:  |  Размер: 83 KiB

Просмотреть файл

@ -4,6 +4,8 @@
<a href="https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Factive-directory-dotnet-graphapi-b2bportal-web%2Fmaster%2Fazuredeploy.json" target="_blank"><img src="http://azuredeploy.net/deploybutton.png"/></a>
[Detailed step-by-step deployment instructions](./Setup.md)
__Details__
* Allows self-service provisioning of guest accounts in a tenant. Portal enables this via API calls to the Microsoft Graph
* Leverages Azure DocumentDB. For development, a downloadable emulator is available: https://aka.ms/documentdb-emulator

81
Setup.md Normal file
Просмотреть файл

@ -0,0 +1,81 @@
## Setup
Two Azure Active Directory apps must be created in your tenant. The first is the administrative app:
* Log into the Azure portal, and click on Azure Active Directory, then click on Properties
![alt text][App1a]
* Click to copy the "Directory ID". This is also referred to as a "Tenant Id". Save this string, you'll need it in a bit.
* Click on App registrations
![alt text][App1]
* Click "+ Add" and enter the name of your app (like "B2B Admin App"). This title will be seen when users are prompted for their credentials.
* Select "Web app / API", and enter the Sign-on URL. If you're setting this up before you deploy the app to Azure, you can enter https://loopback as a placeholder.Cclick "Create".
![alt text][App2]
* From the application list, find the app you just created and click to open and edit it
* Click on "Required permissions", then click "+ Add". On "Select an API", click and select "Microsoft Graph"
* Click "Select permissions". On the "Enable Access" panel that appears, check the following items:
* APPLICATION PERMISSIONS
* Read and write directory data
* Read and write all users' full profiles
* DELEGATED PERMISSIONS
* Sign in and read user profile
* Click "Select"
![alt text][App3]
* Back on the "Required permissions" panel, click the "Grant Permissions" button at the top. This authorized all users in your company to use the application, with the permissions you just assigned. (The actual users that can use the app will be limited to a few select roles, which we'll cover in a bit.)
![alt text][App3a]
* Back on the Settings panel, click "Keys". Under Description, enter a name for the application key, like "Key 1". Under Expires, select 1 or 2 years. (NOTE: you or someone in your organization will need to make a note to come back and refresh this key before it expires.)
* Click "Save". An application secret will be generated and displayed. COPY this key and record it - you'll need it in an minute when setting up the web application. NOTE: this key will not be displayed again and cannot be retrieved. If you lose it, you'll have to come back, delete it, and create another one.
![alt text][App4]
* Finally, before we are done with the first app, record the "Application ID". You can click to the right of it in the main panel and it will copy it to your clipboard. Record it along with the app secret from above - these two strings will be needed to setup the web app.
![alt text][App5]
The second app is the "pre-auth" app. This is a multi-tenant application that you'll create to allow your prospective guests to authenticate against their home Azure Active Directory tenant before completing their sign-up request. This allows you to know that they are who they say they are.
* Follow the steps to create an app above. Name this one something like "B2B Pre-authentication App". It can include your company name, and you can customize it with a logo if you like. Use https://loopback for this sign-on URL too (for now).
* Again, find the app you just created and click to edit it. On this one, on the Properties, page, you need to toggle the "Multi-tenanted" button to "Yes". Click "Save".
![alt text][App6]
* Under "Required permissions", you will again add the Microsoft Graph API. This time you only need to check one item:
* DELEGATED PERMISSIONS
* Sign in and read users' profile
* Click "Select"
* Follow the same steps to generate an app secret, as above. Again remember to copy the key and save it for the web app setup.
* Follow the same steps to copy the "Application ID" and save this one too.
* There is one additional step we need to take for the pre-auth app - we need to edit the "Manifest". This is a text file that gives us detailed access to some of the inner features of Azure AD applications. We need to enable "oauth2AllowImplicitFlow" for this application. By default, it is "false" and we will change it to "true".
In the main panel, click "Manifest" to open the manifest editor.
![alt text][Manifest]
* Find the line "oauth2AllowImplicitFlow", and change "false" to "true". Don't include quotes, just replace the word.
* Click "Save".
* That's it!
__Web Application Setup__
At this point, you should have 4 items saved: the admin app ID and secret, and the pre-auth app ID and secret. You can now click the "Deploy to Azure" button on the landing page of this GitHub Repo, and it will take you to Azure. Log in, and you'll see a form like this one:
![alt text][ARMDeploy]
* Enter the name of your new Resource Group. This is where the web application and DocumentDB will be deployed.
* Select a region to deploy into.
* Enter the Hosting Plan Name. This is the name of the compute resources that will power your web application. This name will be used throughout the deployment as part of the web app and DocumentDB names as well.
* SKU refers to the size and price of your hosting plan. See https://azure.microsoft.com/en-us/pricing/details/app-service/ for details.
* SKU capacity refers to the number of compute instances deployed in your farm. NOTE: this code is currently tested and optimized for a single deployment. A Redis Cache should be implemented as a shared state engine for a farm deployment.
* Tenant Name: this is the name of the Azure Active Directory tenant where you deployed your applications, like "contoso.onmicrosoft.com", or "contoso.com".
* Tenant Id: Paste the TenantID you copied earlier.
* Client Id_admin: Paste the ApplicationID from your admin app.
* Client Secret_admin: Paste the application secret from your admin app.
* Client Id_pre Auth: Paste the ApplicationID from your preauth app.
* Client Secret_pre Auth: Paste the application secret from your preauth app.
The remaining fields are optional - if you like, you can set this app to use your own mail server to send the invitations once they are approved. If you choose this option, you get more flexibility in the content and structure of your invitation emails. By default (without defining a mail server), Azure Active Directory B2B will send the invitations on your behalf, using a standard email template. You do have an option to inject a custom message within the context of this email if you like.
That's it. Click "Purchase" (there's no charge for this software - you are agreeing to pay for the Azure compute resources you are about to provision). Within 2-5 minutes, the deployment will complete and your application will be ready.
The first step will be for an administrator, or someone with "Guest Inviter" privilidges in the tenant, to log in. The app will notice that this is the first time you've logged in and will walk you through the initial configuration. Once that's complete, you can give the web address to potential guests.
Azure App Services supports creating custom web addresses. The customization of App Services is beyond the scope of this article, but details can be found here: https://docs.microsoft.com/en-us/azure/app-service-web/custom-dns-web-site-buydomains-web-app.
[App1]: ./DocImages/App1.png "Open Azure AD Application Panel"
[App1a]: ./DocImages/App1a.png "Copy tenant id"
[App2]: ./DocImages/App2.png "Create Application"
[App3]: ./DocImages/App3.png "Add API access"
[App3a]: ./DocImages/App3a.png "Grant permissions"
[App4]: ./DocImages/App4.png "Generate app secret"
[App5]: ./DocImages/App5.png "Copy app id"
[App6]: ./DocImages/App6.png "Set to multi-tenant"
[Manifest]: ./DocImages/Manifest.png "Editing the manifest"
[ARMDeploy]: ./DocImages/ARMDeploy.png "ARM Deployment form in Azure"

Просмотреть файл

@ -68,6 +68,12 @@
"description": "Required: the application ID GUID of your user pre-auth auth app (see Readme for details)"
}
},
"clientSecret_preAuth": {
"type": "string",
"metadata": {
"description": "Required: the application secret for your user pre-auth auth app"
}
},
"mailServerFqdn": {
"type": "string",
"defaultValue": "",
@ -194,6 +200,10 @@
"Name": "ida:ClientId_PreAuth",
"Value": "[parameters('clientId_preAuth')]"
},
{
"Name": "ida:ClientSecret_PreAuth",
"Value": "[parameters('clientSecret_preAuth')]"
},
{
"Name": "DocDBUri",
"Value": "[reference(concat('Microsoft.DocumentDb/databaseAccounts/', variables('docDbHost'))).documentEndpoint]"

Просмотреть файл

@ -26,9 +26,12 @@
"clientId_preAuth": {
"value": null
},
"mailServerFqdn": {
"clientSecret_preAuth": {
"value": null
},
"mailServerFqdn": {
"value": null
},
"smtpLogin": {
"value": null
},