This article provides specific information on how to use Redgate Monitor's OpenID Connect authentication feature with Redgate Monitor. Please also consult https://documentation.red-gate.com/sm/adding-sql-monitor-users/authenticating-with-openid-connect.
Pre-requisites
- You need to have an "App Registration" set up for Redgate Monitor in Entra ID (previously known as Azure Active Directory)
- The Redgate Monitor Web Server needs to be set up using https
1. On your EntraID "App Registration" add your Redgate Monitor dashboard URL with \openidconnectaccount appended under Redirect Uris, e.g. https://mysqlmonitordasboard.com/openidconnectaccount.
2. Follow the instructions on https://documentation.red-gate.com/sm/adding-sql-monitor-users/authenticating-with-openid-connect, you can get the Client ID and the Tenant ID which you need for the Authority field from the App Registration (Overview screen) in the Azure Portal:
3. In the Claims section, preferred_username and groups are usually adequate choices when connecting to an Entra ID directory. If these don't work please liaise with your Entra ID administrator team.
Was this article helpful?
Articles in this section
- Redgate Monitor migration guide to version 14
- "Your browser does not seem to be accepting cookies." error message
- Setting up OpenID Connect (OIDC) with Entra ID in Redgate Monitor
- Proxy Configuration in Redgate Monitor
- WMI error after DCOM hardening patch
- Redgate Monitor alert tuning
- Redgate Monitor set up for optimal performance
- Redgate Monitor Base Monitor Service Account
- Configuring Metrics and Alerts in Redgate Monitor
- Getting started with Redgate Monitor