- Register a new App in your Azure Active Directory tenant
- Configure Chainloop deployment with the new OIDC settings
Register a new App
In your Azure console go to App registrations and click on New registration.


Create a new client secret
Next Create a new client secret and copy the generated value by clicking on “Certificate & secrets” > “New client secret”
clientSecret in the next step.

Setup ODIC claims
Finally, we need to configure the OIDC claims that Chainloop will use to show information about the user. Specifically, we need to set thegiven_name and family_name claims.
This option can be found in the Token configuration section of your app registration.

(Optional) Enable automatic provisioning of user roles and groups
Enable automatic provisioning of user roles and groups by following the Automatic provisioning of user roles and groups guide.Configure Chainloop deployment
As explained in the deployment guide, Open ID Connect configuration is done using theauth.oidc section of the values.yaml file.
Use the ClientID, Secret and URL from the previous step to configure the OIDC backend as shown below
chainloop auth login and that’s all! Your Chainloop users are now authenticated against your Active Directory tenant.