Apigee Oauth2 Authentication - use Azure Active Directory instead of Okta

asharma377
Participant V

Hi

I was referring to the video using Okta as IDP for implementing Password grant type by Google team.

https://github.com/prithpal/apigee-okta-integration/tree/master/token-minted-in-apigee

I wish to use Microsoft Azure Active Directory as IDP instead of Okta and rest of the steps stay the same.

I am not able to find an equivalent of Authentication API similar to one exposed by Okta in Azure AD. E.g below -

https://dev-591xx.okta.com/api/v1/authn

Is my understanding correct that AD doesn't expose any authentication endpoint directly. What are other alternates that i can use then to implement a similar use case with Azure AD.

Many thanks !!!

0 5 1,248
5 REPLIES 5

Not applicable

Let me share my experience with you. I am using Oracle AD for identity. We are using this via LDAP policy of Apigee.

We also have ISAM as IDP. We get the oauth token from ISAM. The same token gets validated in Apigee using JWT verify policy.

We also have used Auth0 IDP which we do use as service callout validation in the request flow.

Using an LDAP connection into Azure AD may be a good option.

hi priyadarshi/Dino i am using Apigee Edge Public cloud LDAP Policy is not available for the same.

if Azure AD provides http endpoints, then you can use service callout to do validation.

You should be able to use Password Grant as long as you are not using a personal account.

https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-oauth-ropc