The chat responses are generated using Generative AI technology for intuitive search and may not be entirely accurate. They are not intended as professional advice. For full details, including our use rights, privacy practices and potential export control restrictions, please refer to our Generative AI Service Terms of Use and Generative AI Service Privacy Information. As this is a test version, please let us know if something irritating comes up. Like you get recommended a chocolate fudge ice cream instead of an energy managing application. If that occurs, please use the feedback button in our contact form!
Skip to content

How to onboard an application to Siemens Entra ID (Azure AD) single sign-on (OIDC/SAML)¶

This page constitutes an end-to-end guide for onboarding an application to Entra ID. This includes the creation of an application integration, as well as its configuration. If you want to migrate an existing MyID application, you can in addition make use of our specific guide: How to migrate an application from MyID to Siemens Entra ID.

Register an application in EntraID¶

Find more detailed documentation on the official siemens wiki: wiki.siemens.com

If your app is already registered, please skip this steps

  1. Step 1: Create a new app integration in Self-Service Portal
    Go to Siemens Entra ID Self-Service Portal
    Click on + Create Application Integration
  2. Step 2: Configure your app integration in Entra ID
    For OIDC (and OAuth 2.0 / Graph API):

    • Select your newly created app from Entra ID Portal - App Registration List
    • Configure the required OIDC values (Redirect URI, Client Secret, etc.)
    • Configure whether to restrict which "Users and Groups" should be able to authenticate.
  3. Step 3: Configure your app itself
    Configure your application itself (configuration files, code etc.), so it uses the Entra ID app integration.
    Details depend on your application.

Ask for permission to consume the Norm-Service¶

Create a Ticket in TIMA and ask for permission. Send us the Client-ID of your created or existing EntraID application.

https://tima.siemens.com/otwg20

Ticket Template:

In what environment the request is for, TEST or PROD? 
Consumer Application name:
More details about the application (onepager, quick presentation, etc):
Whom are the relevant for people for important communications (Service Manager; Service Owner; Product Owner; etc.)?

Estimated request volume:
Per month:
Per day:
Any specific peaks:

Is your application already registered in EntraID?
If yes, please provide the Client ID:
If no, please register your application and then provide the Client ID.

Get an access token from your registered Application¶

Before this flow can be used, the client must register with the OAuth server same as for authorization code grant flow. After successful registration the client receives a client_id and a client_secret.

Access Token some time just called as token is issued by Authorization Server to the Client. It indicates the rights that the Client has which are delegated by the User. The client sends the token to the resource server when accessing the Protected Resource.

Access tokens are opaque to the Client, and the client’s job is to carry the token, requesting it from the authorization server and presenting it to the protected resource.

KeyValue
Token URL:https://login.microsoftonline.com/38ae3bcd-9579-4fd4-adda-b42e1495d55a/oauth2/v2.0/token
Grant Type:client_credentials
Client-ID:your_client_id
Client-Secret:your_client_secret
Scope:61d62918-bf2a-4aa1-8a96-7659cefdbc69/.default

The Scope "61d62918-bf2a-4aa1-8a96-7659cefdbc69/.default" is very important and must not be changed