×
Menu

6.14. Single Sign On with Microsoft EntraID In your Own Tenant

 
Since v.1.0.3.44
 
Enabling Single Sign On with Microsoft EntraId in ChronoScan with you own tenant
 
For connecting ChronoScan with your own tenants follow these directions.
 
Before explaining the ChronoScan configurations it's important to have some specific configurations in your EntraID application:
 
 
* If you use a restrictive firewall, you must add the following domains to your firewall's allowlist:
     
 
 
 
 
 
Also, It is necessary to configure Some redirect URL for authentication
 
1. A redirect URL Under Mobile and Desktop applications is required and the port must be 3017
2. At least one redirect URL must be configured under Single-pageapplication, this is the redirect url for the web application and it must match your Microsoft MSAL redirectURL configured in the chronoscan dialog, explained below.
 
 
ChronoScan configuration:
 
Azure EntraID configuration for administration
 
 
 
 
 
General SSL/TLS configuration:
 
 
 
Once the credentials have been obtained and ChronoScan is registered within your Azure application, ChronoScan will be able to retrieve information from your application to grant or revoke access permissions for your application users to ChronoScan, This part is managed in the ChronoScan web (enterprise) application users section:
 
 
If this is your first time logging in after obtaining credentials and configuring Entra ID <> ChronoScan integration, no Entra ID user permissions have been granted yet. Therefore, it is important to note that you must log in with a ChronoScan administrator account initially in order to assign permissions to your Azure users
 
Once Logged In with your chronoscan administrator you can now access the users section, the new "EntraID Administrator" Button is now enabled :
 
 
Click that button to open the administrator were you can grant access to either single users of your azure application or whole groups.
 
 
When granting access to a group or individual user, you must assign the specific role they will have in ChronoScan, such as admin, editor, indexer, operator, etc.
Note that users who access ChronoScan through group-based permissions will inherit the role assigned to that group.
 
 
With access enabled, users federated from Entra ID can log in to ChronoScan (Enterprise and Desktop applications) using their Microsoft credentials.
Assigning these users or their respective groups to specific Entities within ChronoScan is a separate step that can be completed post-login, mirroring the process for existing ChronoScan users.
 
Desktop:
 
Web: