Azure AD as IdP


Step 1: Set Up Azure AD as OAuth Provider

  • Navigate to the plugin configuration page, click the "Add New Provider" button (located either in the middle or top-right corner), select Microsoft Entra ID as the application, and copy the callback URL from the plugin and keep it handy, as you'll need it to configure Microsoft Entra ID as the OAuth provider.
  • OAuth / OPenID Single Sign On (SSO) using ADFS, ADFS Management
  • Sign in to Azure portal.
  • Click on view Manage Azure Active Directory.
  • OAuth/OpenID/OIDC Single Sign On (SSO), Microsoft Entra ID (Previously known as Azure AD) SSO Login
  • In the left-hand navigation pane, click the App registrations service, and click New registration.
  • OAuth/OpenID/OIDC Single Sign On (SSO), Microsoft Entra ID (Previously known as Azure AD) SSO App-Registration
  • When the Create page appears, enter your application's registration information.
  • In the Redirect URI enter the Callback URL from the plugin. eg: [application-base-url]/plugins/servlet/oauth/callback
  • OAuth/OpenID/OIDC Single Sign On (SSO), Microsoft Entra ID (Previously known as Azure AD) SSO registration
  • When finished, click Register. Microsoft Entra ID (Previously known as Azure AD) assigns a unique Application ID to your application. Copy Application ID and the Directory ID , this will be your Client ID and Tenent ID respectively.
  • OAuth/OpenID/OIDC Single Sign On (SSO), Microsoft Entra ID (Previously known as Azure AD) SSO Overview
  • Go to Certificates and Secrets from the left navigaton pane and click on New Client Secret. Enter description and expiration time and click on Add option.
  • OAuth/OpenID/OIDC Single Sign On (SSO), Microsoft Entra ID (Previously known as Azure AD) SSO secret-Key
  • Copy Value. This will be your Client Secret.
  • OAuth/OpenID/OIDC Single Sign On (SSO), Microsoft Entra ID (Previously known as Azure AD) SSO Secret-Key-2