Skip to main content Skip to complementary content

Configuring the OAuth server with Microsoft Azure Active Directory Web API

In this example, the authorization server is Azure Active Directory (Azure AD) Web API.

Before you begin

  • As an administrator, you have obtained OAuth 2.0 client credentials from the authorization server.
  • As an administrator, you have configured the authorization server.
  • You have been assigned a global role with the Security Administration capability.


  1. Go to MANAGE > Users.
  2. In the Authentication field of the toolbar, select OAuth from the drop-down list.
  3. Click the Configure authentication icon next to the drop-down list.
  4. In the Connection tab, fill in the following fields.
    Information noteNote: The {tenant} value in the path of the request can be used to control who can sign into the application. The allowed values are tenant identifiers, for example 8eaef023-2b34-4da1-9baa-8bc8c9d6a490, or common for tenant-independent tokens.

    In the Scope field, the email profile value indicates that you want to know the user’s email address and basic profile information.

  5. In the User Attribute Mapping tab, map the user attributes.
  6. In the Request Headers tab, click Add header and enter extra parameters to be added in the HTTP requests to the external authentication server.
  7. In the Group Mappings tab, map the group attribute from the external user account to the Talend Data Catalog group name.
    To enable the automatic group assignment, you can fill in the Groups attribute with the corresponding field name in the user account information. Talend Data Catalog uses the value of this field as the security group assignment.
    The user account information is returned from the OAuth server to Talend Data Catalog after the OAuth server validates an access token upon a login request.
    You can also map individual values assigned to the OAuth attribute that maps to the Groups in Talend Data Catalog.
    You can use the wildcard ("%") when configuring the group mappings. The % matches zero or more characters.
    When populating an OAuth attribute for group assignment, you switch from native and manually managed group assignment to OAuth driven and automatic group assignment for all OAuth users. As an OAuth user, you lose the previous native group assignment the next time you log in.

    When deleting the last OAuth attribute for group assignment, you switch from OAuth driven group assignment to native group assignment. Any OAuth user will be associated with the Guest group, until the users are manually assigned to other groups.

  8. Save your changes.


You can log in to Talend Data Catalog through Azure Active Directory Web API.

Did this page help you?

If you find any issues with this page or its content – a typo, a missing step, or a technical error – let us know how we can improve!