Configure Microsoft Azure Entra ID as an
identity provider to enable secure user authentication for IBM®
Db2® Intelligence Center.
Before you begin
Ensure that you have access to:
- Microsoft Azure Entra ID tenant
- Azure portal
About this task
This task describes how to configure Microsoft Entra
ID as an identity provider for authenticating users in IBM
Db2 Intelligence Center. By
integrating with Microsoft Entra ID, administrators can
use centralized identity management, enable single sign-on, and enforce conditional access policies
to enhance the security and manageability of the IBM
Db2 Intelligence Center environment.
You must have appropriate administrative privileges in both Db2 intelligence center and the Microsoft Entra admin center to do this task.
Procedure
-
Register IBM
Db2 Intelligence Center in Microsoft Entra ID
- Sign in to Azure
Portal.
- Go to Microsoft
.
- Click + New registration.
- Enter the following details:
- Click Register.
- Copy the settings
- In your app registration, go to Overview.
- Copy the Application (client) ID and Directory
(tenant) ID to a notepad.
- Create client secret.
- Go to Certificates & secrets.
- Click + New client secret.
- Add a description and set the expiration period.
- Click Add and copy the secret value
immediately.
- Configure API permissions (required for group role mapping only)
- Go to API permissions.
- Click + Add a permission.
- Select .
- Add Group.Read.All permission.
- Click Grant admin consent.
- Configure a custom API scope (required for group role mapping only)
- Go to Expose an API.
- Click + Add a scope.
- Click Save and continue.
- Provide Scope name and Admin consent display
name as read.user.profile.
- Set Who can consent as Admins and
users and provide an Admin consent
description.
- Set State as Enabled.
- Click Add scope at the bottom.
- Token configuration (required for group role mapping only)
- Go to Token configuration.
- Click Add groups claim.
- Select All groups option.
- Click Add at bottom.
- Configure multiple app roles (required for app role mapping only)
- To add app user roles, go to Application role.
- Under Create app role, enter the user roles to be mapped for
Console Admin, Database Admin, and Database
User.
- Assigning custom app roles to users/groups (required for app role mapping only)
- Go to .
- Select Db2 intelligence center.
- Click Assign user and groups.
- Click + Add user/group.
- Select a user/group and assign any of the roles that were
created in Configure app role.
- Click Assign button assign the IBM
Db2 Intelligence Center role to that
user.
Note: Repeat these steps to assign roles to all the users of IBM
Db2 Intelligence Center.
- Update IBM
Db2 Intelligence Center
configuration
- Login to IBM
Db2 Intelligence Center using the
setup admin credentials.
- Click Administration tab from right panel.
- Click Authentication under User
Management.
- Select Azure Entra ID and provide the Client
ID, Tenant ID, and Client Secret generated
from Step 2: Copy the settings and Step 3: Create client secret. If you select App
Role Mapping, provide the app roles created in Entra ID. When mapping multiple roles to
a single DIC role, separate them using a pipe (|). For Group Mapping,
multiple groups can also be mapped to a single DIC role using the same separator.
- Click Save.
- If all the provided credentials are correct, the Entra app summary details can be
viewed in Authentication window.
- Test the authentication flow
- Sign out of IBM
Db2 Intelligence Center. The
Login to IBM
Db2 Intelligence Center window
opens.
- Click Sign in with Entra ID which will redirect to the Microsoft page for authentication.
- After login, you will get redirected back to IBM
Db2 Intelligence Center
application.
Results
Microsoft Entra ID authentication for IBM
Db2 Intelligence Center is
successfully configured.