No results

    Azure Active Directory authentication

    Azure AD authentication supports the following authentication methods:

    • Azure AD cloud-only identities
    • Azure AD hybrid identities that support:
      • Cloud authentication with two options coupled with seamless single sign-on (SSO)
        • Azure AD password hash authentication
        • Azure AD pass-through authentication
      • Federated authentication


    Further details can also be found here.


    In the Authentication tab of the connection settings dialog, select the applicable Azure Active Directory authentication method, then provide the username/password and/or Tenant ID, depending on the option:




    See instructions on how-to find your tenant ID.


    Azure AD with Multi Factor Authentication

    With the MFA method, depending on the set up of your Azure AD, you may be presented with this pop-up dialog:

    Azure AD MFA consent


    Your IT admin must give consent in order to allow you access to the database.  Consent is required once for the organization.


    Here is the description of the process:

    1. Here is an overview of the process and a blog article.
    2. Probably "user consent settings" are configured by your admins to "Do not allow user contest" for all apps or the user doesn't have enough permissions.
      That's why an admin confirmation is required to grant access to the Hackolade application.
    3. Admins should review such requests, and can configure them in Admin consent settings.
      It's possible to select users or groups there and enable email notifications for requests.
    4. When a user requests approval from an admin for an application, the admin may approve it using the link in an email notification or review a request in the admin consent requests UI.
    5. The user should write a justification message and request approval from an admin, and the admin should review the request and allow access to the Hackolade app