Note: Customer domain must be provided to Glean before setup
Register a new app
Sign into the Azure portal. Select Azure Active Directory, then App registrations > New registration.
Register an app with the following:
Name: Glean SSO
Supported account types: Accounts in this organizational directory only. Paste link below for the Redirect URI under Web:
https://[customer-domain]-be.glean.com/authorization-code/callback?isExtension=1
Click Register.
Click Authentication under Manage.
Under Web, click Add URI to add this additional link:
https://[customer-domain]-be.glean.com/authorization-code/callback
Configure permissions
On the left side of the navigation on the overview page, click on the API permissions page under Manage.
Click Add a Permission and select Microsoft Graph
Choose Application Permissions and add the following:
openid email offline_access profile
User.Read.All [Optional for SSO only]
If the tenant has Admin Consent requests turned on, then when users attempt to SSO with the set-up app, the user will receive a dialogue to submit an Admin consent request.
Grant admin consent
Ensure you are signed in to Azure as a Global, Application or Cloud Application Administrator.
Use the search box to navigate to Enterprise applications. Select the Glean SSO app created from the list of applications.
Click on Permissions under Security. Review the permissions shown, and then click Grant admin consent.
Generate a SCIM shared secret token (length > 30) locally
Example command to generate token openssl rand -base64 30
Store the SCIM shared secret token in Glean
Toggle the setting to [Secret]
In the Key name field, add: SHARED_SCIM_SECRET
In the Key value field, add: <token> created in step 1.a
[Save] and verify that a pop-up message “Written” appears
Create Client ID and Secrets
Glean also supports SCIM-based user de-provisioning, which provides a fast path for invalidating sessions for any deactivated/de-provisioned users. More details on setting up Azure SCIM can be found here. Since Azure does not support SCIM with Oauth, we use a separate app for the SCIM integration.
Note: Apps are different. Ensure the scope can be set to “sync all users and groups” to handle de-provisioning for all deactivated users.
Follow the example in https://learn.microsoft.com/en-us/azure/active-directory/app-provisioning/use-scim-to-provision-users-and-groups#getting-started
In SCIM connection settings
Create an Enterprise Application
choose the option to integrate any other application you don't find in the gallery
Go to the Provisioning tab
Set Automatic
For Tenant URL use
For Secret Token use
The Glean admin can help with setup provide the SHARED_SCIM_SECRET
Click ‘Save’
In the Provisioning tab, in the To App settings, click Edit
Click on Start Provisioning
Upload keys
Scroll to the top of the left sidebar and click Overview.
Copy the following content from the center Essentials panel and paste it into Glean
Application (client) ID
Directory (tenant) ID
Click Save in Glean