Microsoft Entra ID external IDP
The Microsoft social connection lets users log in to your application using their Microsoft profile.
Prerequisites
Before you begin:
-
Sign up for an account on the Azure portal.
-
The Azure account must be at least a Cloud Application Administrator.
-
Complete the set up a tenant quickstart.
Register an application at Microsoft
Registering your application establishes a trust relationship between your app and the Microsoft identity platform. The trust is unidirectional: your app trusts the Microsoft identity platform, and not the other way around. After you create the application, you cannot move the application object between different tenants.
Follow these steps for app registration:
-
Sign in to the Microsoft Entra admin center using your Azure account, which must be at least a Cloud Application Administrator.
-
If you have access to multiple tenants, use the Settings icon in the top menu to switch to the tenant in which you want to register the application from the Directories + subscriptions menu.
-
Browse to Identity > Applications > App registrations and select New registration.
-
Enter a display name for your application.
-
Specify who can use the application, sometimes called its sign-in audience.
-
Add a redirect URI.
A redirect URI is the location where the Microsoft identity platform redirects a user's client and sends security tokens after authentication.
- Select Register to complete the initial app registration.
Get a client ID and client secret
When registration finishes, the Microsoft admin center displays the app registration's Overview pane. You see the Application (client) ID. Also called the client ID, this value uniquely identifies your application in the Microsoft identity platform.
Generate a client secret:
-
Under the Manage menu, go to Certificates & Secrets.
-
Click New client secret.
-
Add a description for your client secret.
-
Select an expiration date for the secret or specify a custom lifetime.
The client secret lifetime is limited to two years (24 months) or less. You can't specify a custom lifetime longer than 24 months.
Microsoft recommends that you set an expiration value of less than 12 months.
-
Select Add.
-
Record the secret's value for use in your client application code. This secret value is never displayed again after you leave this page.
Get the OpenID Connect metadata document
-
Go to Overview - Endpoints and scroll to get to OpenID Connect metadata document.
-
Copy the configuration's link.
More information about enrollment process you can find here.
Configure Microsoft Entra ID in the identity broker
-
Click Add identity provider and select OpenID Connect.
-
Typically, you provide the following information:
- Display name: Microsoft (for example)
- Active: Select the check box
- Client ID: The client ID
- Authentication method: Client secret post
- Client secret: The [client secret] (#get-a-client-id-and-client-secret)
- Well-known configuration endpoint: OpenID Connect metadata document link that you copied
- This fills the Authorization endpoint, Token endpoint, Issuer, User information endpoint, and JWKs URI.
- Signature type: Asymmetric
- Encrypted JWT: Do not select the check box.
- Single logout: Do not select the check box.
Variant
You always need at least one variant. For Microsoft Entra ID, you just need to configure a variant name, such as Authentication. For scopes, Thales recommends openid
, and profile
, but you can add more scopes.