Skip to main content
Version: v2.9.1

Authentication

Yeedu supports two types of authentication: Azure AD and LDAP.

1. Azure AD

To set up Yeedu with Azure AD, ensure that the Service Principal Name (SPN) has the necessary permissions to read users and groups from your organization's Active Directory.

To add a user to Yeedu, we first add the user to the AD group and once added, user can login to Yeedu. Once the user logs in, Admin will add that user to a tenant based on their usecase requirements.

ad-group-info

The above screenshot shows a sample AD group G_Yeedu.

add-user-to-ad-group

To grant a user access to Yeedu, add the user to the AD group. Once added, the user can log in to Yeedu. Administrators can then assign the user to a tenant based on their specific requirements. To add users to Yeedu, click on the Add Members button and add the respective user to the AD Group. Yeedu automatically gets the new user data and the new user can now login to Yeedu using their Azure credentials.

Below are the variables required to configure Azure AD in Yeedu's connection properties file:

VariableDescriptionRequired
YEEDU_AUTH_AZURE_AAD_CLIENT_IDClient ID for Azure Active Directory (AAD) authenticationYes
YEEDU_AUTH_AZURE_AAD_TENANT_IDTenant ID for Azure Active Directory (AAD) authenticationYes
YEEDU_AUTH_AZURE_AAD_CLIENT_SECRETClient secret for Azure Active Directory (AAD) authenticationYes
YEEDU_AUTH_AZURE_AAD_ALLOWED_DOMAINAllowed domain for Azure Active Directory (AAD) authenticationYes

2. LDAP

Below are the variables required to configure LDAP in Yeedu's connection properties file. Based on your organziations LDAP tree structure, provide the BASE_DN and BIND_DN.

VariableDescriptionDefault ValueRequired
YEEDU_AUTH_LDAP_ORGANISATIONLDAP organization nameyeeduYes
YEEDU_AUTH_LDAP_DOMAINLDAP domainyeedu.comYes
YEEDU_AUTH_LDAP_ADMIN_PASSWORDPassword for LDAP administratorNdbk5LgbYes
YEEDU_AUTH_LDAP_HOSTNAMEHostname or IP address of the LDAP serverEndpoint URL of LDAPYes
YEEDU_AUTH_LDAP_PORTPort number for LDAP server389No
YEEDU_AUTH_LDAP_BASE_DNBase DN for LDAPdc=yeedu,dc=comYes
YEEDU_AUTH_LDAP_BIND_DNBind DN for LDAPcn=admin,dc=yeedu,dc=comYes
YEEDU_AUTH_LDAP_BIND_PASSWORDPassword for LDAP bind userNdbk5LgbYes
YEEDU_AUTH_LDAP_SSL_ENABLEDEnable SSL encryption for LDAP connectionfalseNo

3. Azure Single Sign-On (SSO) Configuration

Yeedü supports authentication through Azure Single Sign-On (SSO), leveraging your organization’s Azure Active Directory (AAD) to deliver a seamless and secure login experience.

When configured with Azure SSO, users can access Yeedü using their existing Microsoft 365 or Azure credentials, eliminating the need for separate passwords or local authentication.


3.1. User Access Flow

  1. Ensure the user is part of the designated Azure AD group (for example, G_Yeedu).
  2. Once added, the user can log in to Yeedü directly through the Azure SSO login page.
  3. The Yeedü Administrator can then assign the user to the appropriate tenant based on their role or project requirements.

Note:
Yeedü automatically syncs user information from Azure AD. Once a user is added to the AD group, they can sign in immediately via SSO — no manual user provisioning is required.

Example:

  • The Azure AD group G_Yeedu manages user membership for Yeedü access.
  • To add a user, click Add Members, select the required user, and confirm.
  • After the addition, Yeedü recognizes the user automatically and enables login through Azure SSO.

3.1.2. Application Registration

To integrate Yeedü with Azure Single Sign-On, register the Yeedü application in Azure Active Directory:

  1. Sign in to the Azure Portal.
  2. Navigate to Azure Active Directory → App registrations.
  3. Click + New registration.
  4. Set the following values:
    • Name: Yeedu
    • Redirect URI: Leave blank or configure later, if required.
  5. Click Register.

Once registered, you’ll obtain the following values from the Azure portal:

  • Application (Client) ID
  • Directory (Tenant) ID
  • Client Secret (generated under Certificates & Secrets)

Use these values in the Yeedü configuration file as shown below.


3.2. Configuration Variables

Add the following variables to the yeedu-connection.properties file to enable Azure SSO authentication:

VariableDescriptionRequired
YEEDU_AUTH_TYPESet this value to AZURE_SSO to enable Single Sign-On authentication.Yes
YEEDU_AUTH_AZURE_AAD_CLIENT_IDClient ID for Azure AD SSO integration (from App registration).Yes
YEEDU_AUTH_AZURE_AAD_TENANT_IDTenant ID associated with the Azure AD directory.Yes
YEEDU_AUTH_AZURE_AAD_CLIENT_SECRETClient secret for the registered Azure AD application.Yes
YEEDU_AUTH_AZURE_AAD_ALLOWED_DOMAINDomain allowed for Azure AD SSO authentication.Yes

Summary

  • Azure SSO provides passwordless, secure access using Azure AD credentials.
  • User onboarding is automated once they’re added to the configured AD group.
  • Configure YEEDU_AUTH_TYPE=AZURE_SSO in yeedu-connection.properties to enable Single Sign-On during deployment.
  • Ensure the Yeedü application is registered in Azure AD to obtain the required Client ID, Tenant ID, and Client Secret.