Available as of v2.0.3

If you have an instance of Active Directory (AD) hosted in Azure, you can configure Rancher to allow your users to log in using their AD accounts. Configuration of Azure AD external authentication requires you to make configurations in both Azure and Rancher.

Prerequisite: Have an instance of Azure AD configured.

Note: Most of this procedure takes place from the Microsoft Azure Portal.

Azure Active Directory Configuration Outline

Configuring Rancher to allow your users to authenticate with their Azure AD accounts involves multiple procedures. Review the outline below before getting started.

Tip: Before you start, we recommend creating an empty text file. You can use this file to copy values from Azure that you’ll paste into Rancher later.

1. Register Rancher with Azure

Before enabling Azure AD within Rancher, you must register Rancher with Azure.

  1. Log in to Microsoft Azure as an administrative user. Configuration in future steps requires administrative access rights.

  2. Use search to open the App registrations service.

    Open App Registrations

  3. Click New application registration and complete the Create form.

    New App Registration

    1. Enter a Name (something like Rancher).

    2. From Application type, make sure that Web app / API is selected.

    3. In the Sign-on URL field, enter the URL of your Rancher Server.

    4. Click Create.

2. Create an Azure API Key

From the Azure portal, create an API key. Rancher will use this key to authenticate with Azure AD.

  1. Use search to open App registrations services. Then open the entry for Rancher that you created in the last procedure.

    Open Rancher Registration

    Step Result: A new blade opens for Rancher.

  2. Click Settings.

  3. From the Settings blade, select Keys.

  4. From Passwords, create an API key.

    1. Enter a Key description (something like Rancher).

    2. Select a Duration for the key. This drop-down sets the expiration date for the key. Shorter durations are more secure, but require you to create a new key after expiration.

    3. Click Save (you don’t need to enter a value—it will automatically populate after you save).

  5. Copy the key value and save it to an empty text file.

    You’ll enter this key into the Rancher UI later as your Application Secret.

    You won’t be able to access the key value again within the Azure UI.

3. Set Required Permissions for Rancher

Next, set API permissions for Rancher within Azure.

  1. From the Settings blade, select Required permissions.

    Open Required Permissions

  2. Click Windows Azure Active Directory.

  3. From the Enable Access blade, select the following Delegated Permissions:

    • Access the directory as the signed-in user
    • Read directory data
    • Read all groups
    • Read all users’ full profiles
    • Read all users’ basic profiles
    • Sign in and read user profile
  4. Click Save.

  5. From Required permissions, click Grant permissions. Then click Yes.

    Note: You must be signed in as an Azure administrator to successfully save your permission settings.

4. Add a Reply URL

To use Azure AD with Rancher you must whitelist Rancher with Azure. You can complete this whitelisting by providing Azure with a reply URL for Rancher, which is your Rancher Server URL followed with a verification path.

  1. From the Setting blade, select Reply URLs.

    Azure: Enter Reply URL

  2. From the Reply URLs blade, enter the URL of your Rancher Server, appended with the verification path: <MY_RANCHER_URL>/verify-auth-azure.

    Tip: You can find your personalized Azure reply URL in Rancher on the Azure AD Authentication page (Global View > Security Authentication > Azure AD).

  3. Click Save.

Result: Your reply URL is saved.

Note: It can take up to five minutes for this change to take affect, so don’t be alarmed if you can’t authenticate immediately after Azure AD configuration.

5. Copy Azure Application Data

As your final step in Azure, copy the data that you’ll use to configure Rancher for Azure AD authentication and paste it into an empty text file.

  1. Obtain your Rancher Tenant ID.

    1. Use search to open the Azure Active Directory service.

      Open Azure Active Directory

    2. From the Azure Active Directory menu, open Properties.

    3. Copy the Directory ID and paste it into your text file.

      You’ll paste this value into Rancher as your Tenant ID.

  2. Obtain your Rancher Application ID.

    1. Use search to open App registrations.

      Open App Registrations

    2. Find the entry you created for Rancher.

    3. Copy the Application ID and paste it to your text file.

  3. Obtain your Rancher Graph Endpoint, Token Endpoint, and Auth Endpoint.

    1. From App registrations, click Endpoints.

      Click Endpoints

    2. Copy the following endpoints to your clipboard and paste them into your text file (these values will be your Rancher endpoint values).

      • Microsoft Graph API endpoint (Graph Endpoint)
      • OAuth 2.0 token endpoint (v1) (Token Endpoint)
      • OAuth 2.0 authorization endpoint (v1) (Auth Endpoint)

Note: Copy the v1 version of the endpoints

6. Configure Azure AD in Rancher

From the Rancher UI, enter information about your AD instance hosted in Azure to complete configuration.

Enter the values that you copied to your text file.

  1. Log into Rancher. From the Global view, select Security > Authentication.

  2. Select Azure AD.

  3. Complete the Configure Azure AD Account form using the information you copied while completing Copy Azure Application Data.

    Important: When entering your Graph Endpoint, remove the tenant ID from the URL, like below.


    The following table maps the values you copied in the Azure portal to the fields in Rancher.

    Rancher Field Azure Value
    Tenant ID Directory ID
    Application ID Application ID
    Application Secret Key Value
    Endpoint https://login.microsoftonline.com/
    Graph Endpoint Microsoft Azure AD Graph API Endpoint
    Token Endpoint OAuth 2.0 Token Endpoint
    Auth Endpoint OAuth 2.0 Authorization Endpoint
  4. Click Authenticate with Azure.

Result: Azure Active Directory authentication is configured.