Integration of Grafana with Azure Active Directory

Hi,

I need to integrate grafana with Azure Active Directory. Can someone please help me with the steps. I have installed grafana on Kubernetes(AKS) using helm.

Should work just like any other active directory server. See the docs for LDAP auth: https://grafana.com/docs/auth/ldap/#ldap-authentication

@hitesh1907nayyar Here’s an example config that works with Azure Active Directory.

# To troubleshoot and get more log info enable ldap debug logging in grafana.ini
# [log]
# filters = ldap:debug

[[servers]]
host = "your_ad_domain.tld"
port = 389
use_ssl = false
start_tls = false
ssl_skip_verify = true
#bind_dn = "YOUR_AD_DOMAIN\\%s"
bind_dn = "%s"
#search_filter = "(sAMAccountName=%s)"
search_filter = "(userPrincipalName=%s)"
search_base_dns = ["dc=your_ad_domain,dc=tld"]

[servers.attributes]
name = "givenName"
surname = "sn"
#username = "sAMAccountName"
username = "userPrincipalName"
member_of = "memberOf"
email =  "mail"


# Map ldap groups to grafana org roles
[[servers.group_mappings]]
group_dn = "CN=GrafanaAdmins,OU=AADDC Users,DC=your_ad_domain,DC=tld"
org_role = "Admin"
# The Grafana organization database id, optional, if left out the default org (id 1) will be used
#org_id = 1

[[servers.group_mappings]]
#group_dn = "cn=users,dc=your_ad_domain,dc=com"
group_dn = "CN=GrafanaEditors,OU=AADDC Users,DC=your_ad_domain,DC=tld"
org_role = "Editor"


[[servers.group_mappings]]
# If you want to match all (or no ldap groups) then you can use wildcard
group_dn = "*"
org_role = "Viewer"