Hopp til hovedinnhold

Setup and administration for Cognite extractors

You can use OpenID Connect and your existing identity provider (IdP) framework to manage access to Cognite Data Fusion (CDF) data securely. We currently support Microsoft Entra ID (formerly Azure Active Directory), Microsoft's cloud-based identity and access management service.

This article explains how to register and configure apps in Microsoft Entra ID (ME-ID) to use with extractors or scheduled custom scripts.

note

To perform the steps below, you must be an administrator of Microsoft Entra ID.

Before you start

Make sure you have registered the Cognite API and the CDF portal application in Microsoft Entra ID and set up Microsoft Entra ID and CDF groups to control access to CDF data.

Step 1: Register an app in Microsoft Entra ID to use with an extractor

Info

Cognite recommends that you register one app per extractor and per environment. For example, we recommend 3 app registrations to run one extractor in dev, test, and prod environments.

  1. Sign in to the Azure portal as an admin.
  2. If you have access to multiple tenants, use the Directory + subscription filter (Directory + subscription filter ) in the top menu to select the tenant in which you want to register an application.
  3. Search for and select Microsoft Entra ID.
  4. Under Manage, select App registrations > New registrations.
  5. In the Register an application window, enter the app name and select Register.
  6. Copy and make a note of the Application (client) ID. You'll need this value for authentication when reading and writing data with the extractor.
  7. Under Manage, select Certificates & secrets > New client secret.
OIDC client secret
  1. Enter a client secret description and an expiry time, and then select Add.

  2. Copy and make a note of the client secret in the Value field.

    Important

    Make sure you copy this value now. This value will be hidden after you leave this page.

Step 2: Create a group in Microsoft Entra ID and add the registered app as its member

  1. Open the overview window in Microsoft Entra ID and select Manage > Groups.
  2. Create a group. Read more here.
  3. Open the group. Under Manage, select Members > Add members.
  4. Find the app you created above and click Select.
  5. Add all users you want to have access to extractors as members.
  6. Return to the overview, and then copy and make a note of the Object Id.
OIDC Add app to group
  1. Sign in to the CDF portal application as an admin.
  2. In the top menu, select Manage & Configure > Manage access.
  3. In the Access management window, select Groups > Create new group.
  4. In the Create a new group window, enter the group name (case sensitive).
  5. Add the necessary capabilities for your extractor. See Extractor capabilities for details.
  6. Link the group to an Microsoft Entra ID group:
    1. In the Source ID field, enter the Object Id for the AAD group exactly as it exists in AAD. You can use the same group Id for multiple extractors.
    2. In the Source name field, enter the name of the group in Microsoft Entra ID.

Step 4: Run extractors

Configure and run the extractor according to the extractor documentation.