Configuring SSO for Stax Cost & Compliance - Azure AD

Learn how to integrate your company's Azure AD implementation for federated login access into Stax's Cost & Compliance module

Article Tags
On This Page
Before You BeginPrepare the OIDC URLsConfigure Azure ADConfigure Stax Cost & Compliance Module to Allow Azure AD Sign-InHow Do You Know This Worked?See also

Stax's Cost & Compliance module integrates with your corporate identity provider using OpenID Connect (OIDC). This allows you to bring your own identities and identity management controls to the Stax Cost & Compliance module. Azure AD is a cloud identity platform that works well with Stax.

This guidance assumes you're subscribed to only the Stax Cost & Compliance module. If you're a Stax Platform customer, review this article instead

Before You Begin

  • Estimated time to complete: 1 hour
  • You need permissions to administer the Azure AD environment
  • You must decide whether you wish for all users at your email domain (@example.com) to use SSO, or whether users should be required to access the trigger URL to invoke SSO

Prepare the OIDC URLs

First, you'll need to determine some URLs. These must be generated by the Stax Support team for you. Please contact us by email at support@stax.io to have the URLs generated. You'll be provided two URLs:

  1. A callback URL that looks like this: https://app.stax.io/auth/oidc/some-token-here/callback
  2. A trigger URL that looks like this: https://app.stax.io/auth/oidc/some-token-here

Configure Azure AD

  1. Log in to the Azure AD Admin console. From the header, choose App Registrations (you may need to search for it)
  2. Click New registration
  3. Provide a name, such as Stax Cost & Compliance
  4. When prompted for Supported account types, choose Accounts in this organizational directory only
  5. Choose Client Application for the Platform configuration, then click Register to create the App
  6. Choose Add a platform, then choose Web as the application type
  7. In the redirect field, provide the callback URL provided to you by Stax Support, then choose Configure
  8. On the left hand menu, choose Certificates & Secrets, then New client secret
  9. Give the secret a description, such as Stax Cost & Compliance SSO, then choose Never for the expiry
  10. Record the value of the generated Client Secret
  11. On the overview page, record the value of the Application (client) ID

Configure Stax Cost & Compliance Module to Allow Azure AD Sign-In

Provide Stax Support with the Application (client) ID, Client secret, and Tenant ID values you recorded earlier. These are required for Stax to enable SSO for the Cost & Compliance module. You should also let us know if you'd like for SSO to be enabled for your entire email domain (e.g. anyone with an email address ending in @example.com), or whether users should be required to access the trigger URL to invoke SSO.

How Do You Know This Worked?

Next time you navigate to the trigger URL or provide your email address at the Stax Cost & Compliance module login page (in the case of email domain-wide enablement), you'll be redirected to Azure AD to prove your identity.

See also