Saviynt unveils its cutting-edge Intelligence Suite products to revolutionize Identity Security!
Click HERE to see how Saviynt Intelligence is transforming the industry.
Saviynt Copilot Icon

CERTIFICATE FOR AAD CONNECTOR

ag420
Regular Contributor
Regular Contributor

Hello experts 🙂

My client don't want to use secrets for authentication for the connector to AzureAD. Can Saviynt supports certificate-based authentication with Azure AD ?

4 REPLIES 4

NM
Honored Contributor II
Honored Contributor II

Hi @ag420 SSL certificate based authentication is supported with rest don't think it is with AzureAD ootb connector.

Amit_Malik
Valued Contributor II
Valued Contributor II

You have to use REST connector in that case for your client

Kind Regards,
Amit Malik
If this helped you move forward, please click on the "Kudos" button.
If this answers your query, please select "Accept As Solution".

rushikeshvartak
All-Star
All-Star

Just adding steps for REST Connector .

To implement certificate-based authentication, follow these steps:

  1. Generate a Certificate:

    • Generate a certificate (self-signed or from a trusted Certificate Authority) in a supported format (e.g., .pem or .pfx).
  2. Register Application in Azure AD:

    • Register an app in Azure AD that Saviynt will use to connect.
    • In the Azure AD portal, go to Certificates & Secrets under the registered app, and upload the public key of your certificate.
  3. Configure Saviynt Connection:

    • In Saviynt, update the CONNECTIONJSON of the Azure AD connector.
    • Instead of using client secrets, provide the certificate details such as:
      • client_certificate: The certificate data (either as a file or as a base64-encoded string).
      • client_certificate_password (if required for .pfx files).
      • Other OAuth authentication details, including tenant ID, client ID, and resource URL.

Regards,
Rushikesh Vartak
If this helped you move forward, click 'Kudos'. If it solved your query, select 'Accept As Solution'.

ag420
Regular Contributor
Regular Contributor

Thanks @rushikeshvartak  🙂