This feature is only available on our enterprise plan. Enterprise workspaces come with additional features and support to meet your organization’s needs. Check out our pricing page for more information on enterprise.
Users can authenticate to Dovetail using Azure Active Directory SSO.
Sign in to the Azure Portal.
If you have access to more than one tenant, select the tenant you want to use for Dovetail SSO in the top-right corner.
Search for and select Azure Active Directory.
Under Manage, click App registrations.
Click New registration.
Enter a meaningful application name to display to users.
Tick both boxes under Select the tokens you would like to be issued by the authorization endpoint.
Under Supported account types select Accounts in this organizational directory only.
Under Redirect URL select Web and enter https://dovetailapp.com/users/oauth2/callback.
Note the application’s Application (client) ID and Directory (tenant) ID as these will be used to configure Dovetail.
Under Manage click Certificates & secrets.
Under Client secrets click New client secret.
Select when you want the secret to expire. Note that Dovetail SSO will stop working if you don’t create a new secret before the old one expires.
Note the Secret value as this will be used to configure Dovetail.
Using the Azure application’s Application (client) ID as the Client ID and Secret value as the Client secret you can Configure OpenID Connect directly in Dovetail.
In the Discovery URL input, enter https://login.microsoftonline.com/TENANT/v2.0/.well-known/openid-configuration where TENANT is the application’s Directory (tenant) ID.
Was this article useful?
Configure OpenID Connect
Can’t find what you’re looking for? Search through our articles or contact our support team and get a response within 24 hours.