Federation (client side) - Log in to your organization’s Entra ID Portal https://entra.microsoft.com
- From the left-side navigation pane, expand Identity>Applications and select App registration
- From the App Registrations section, click the + New registration button at the top of the page.
- In the Register an application screen, make the following changes:
- Name: TylerIdentityWorkforceIntegration
- Supported Account Type: select accounts in this organizational directory only
- Redirect URL (Select a platform) drop-down box: select Web
- Redirect URL textbox:
https://tyler-<customeridentifier>.okta.com/oauth2/v1/authorize/callback
- From the Overview page, copy the Application (client) ID, Directory (tenant) ID
- Select Certificates & secrets from the Manage section of the navigation bar
- Ensure the Client Secrets tab is select and click the + New client secret button
- In the Add a client secret pop-up window, enter the following:
- Description: TylerIdentityWorkforceIntegration
- Expires: 730 days (24 months). Note: While Tyler recommends setting the expiration period as long as possible to reduce the need to reconfigure your federation in TID-W when the secret expires, Always consult your own internal security posture for the best recommendation
- Click the Add button when finished
- Ensure you are returned to the Certificates and Secrets section with the Client secrets tab selected, find the secret Value and click Copy
Admin CenterCenter - Log into Admin Center using Org admin account
- Navigate to Settings > Domains to add the desired authentication domains
- Navigate to Identity workforce > identity providers > Add a new provider > Azure
- Input Azure information
- Name - Tylertown, ME
- Client ID - xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
- Client Secret - can vary in length and characters
- Secrets expiration - MM/DD/YYYY
- Email Domains - Authenticating domains for Entra
- Azure Tenant ID - xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
- Select Save
|