×
Menu

6.13. Single Sign On with Microsoft EntraID

 
Since v.1.0.3.44
 
Enabling Single Sign On with Microsoft EntraId in ChronoScan
 
To utilize Microsoft Entra ID Single Sign-On with ChronoScan, it must be enabled within the global system parameters window, and the following settings must be configured:
 
 
Azure EntraID configuration for administration
 
 
        2. Prerequisites for Integration: For ChronoScan to authenticate with your Microsoft Entra ID, the application itself needs to be registered within your Azure Entra ID tenant. This process, typically performed by an Azure administrator, involves:
1. Signing in to the Azure Portal with an administrator account.
2. Registering ChronoScan as a new application.
3. Obtaining the essential application credentials (e.g., Application (client) ID, Directory (tenant) ID, and Client Secrets) generated during this registration. These credentials are then used within ChronoScan's configuration to establish trust and enable Single Sign-On.
 
 
 
General SSL/TLS configuration:
 
 
 
Once the credentials have been obtained and ChronoScan is registered within your Azure application, ChronoScan will be able to retrieve information from your application to grant or revoke access permissions for your application users to ChronoScan, This part is managed in the ChronoScan web (enterprise) application users section:
 
 
If this is your first time logging in after obtaining credentials and configuring Entra ID <> ChronoScan integration, no Entra ID user permissions have been granted yet. Therefore, it is important to note that you must log in with a ChronoScan administrator account initially in order to assign permissions to your Azure users
 
Once Logged In with your chronoscan administrator you can now access the users section, the new "EntraID Administrator" Button is now enabled :
 
 
Click that button to open the administrator were you can grant access to either single users of your azure application or whole groups.
 
 
When granting access to a group or individual user, you must assign the specific role they will have in ChronoScan, such as admin, editor, indexer, operator, etc.
Note that users who access ChronoScan through group-based permissions will inherit the role assigned to that group.
 
 
With access enabled, users federated from Entra ID can log in to ChronoScan (Enterprise and Desktop applications) using their Microsoft credentials.
Assigning these users or their respective groups to specific Entities within ChronoScan is a separate step that can be completed post-login, mirroring the process for existing ChronoScan users.
 
Desktop:
 
Web: