Microsoft Entra ID SSO Setup
Configure single sign-on with Microsoft Entra ID (formerly Azure Active Directory) using OpenID Connect
Microsoft Entra ID SSO Setup
Configure single sign-on (SSO) to allow your organization members to authenticate using Microsoft Entra ID. This guide uses the OpenID Connect (OIDC) protocol for a modern, secure integration.
Prerequisites
Before you begin, ensure you have:
- Microsoft Entra ID tenant with administrative access
- Azure Portal access with permissions to create app registrations
- Organization owner or admin role in Securtea
- Your organization's email domain (e.g.,
yourcompany.com)
Overview
The SSO setup process involves two main steps:
- Configure an app registration in Microsoft Entra ID - Register Securtea as an application and generate credentials
- Configure SSO in Securtea - Enter the app registration details to enable SSO for your organization
Once configured, users with your organization's email domain will automatically be redirected to Microsoft Entra ID when signing in.
Step 1: Create App Registration in Azure Portal
1.1 Navigate to App Registrations
- Sign in to the Azure Portal
- Navigate to Microsoft Entra ID (or search for "Entra ID" in the top search bar)
- In the left sidebar, select App registrations
- Click + New registration
1.2 Configure the App Registration
On the registration page:
-
Name: Enter a descriptive name (e.g.,
Securtea SSO) -
Supported account types: Select Accounts in this organizational directory only (Single tenant)
-
Redirect URI:
- Platform: Web
- URI:
https://yourdomain.com/api/auth/sso/callback/oidc-{org-slug}
You'll get the exact callback URL from Securtea in Step 2. You can also add this later.
-
Click Register
1.3 Copy the Application (Client) ID
After registration:
- On the app overview page, locate the Application (client) ID
- Copy this UUID - you'll need it for Securtea configuration
- Also note your Directory (tenant) ID - you'll use this in the Issuer URL
1.4 Create a Client Secret
- In the left sidebar, select Certificates & secrets
- Click + New client secret
- Description: Enter a name (e.g.,
Securtea Integration) - Expires: Choose an expiration period (e.g., 24 months)
- Click Add
- Important: Immediately copy the Value (not the Secret ID) - it will only be shown once
- Store this securely - you'll enter it into Securtea
The client secret value is only displayed once. If you lose it, you'll need to create a new secret.
1.5 Configure API Permissions (Optional)
By default, the app has permissions to read basic user profile information. To enable additional capabilities:
-
In the left sidebar, select API permissions
-
Verify these Microsoft Graph delegated permissions are present:
openid- Required for OIDCemail- Access user emailprofile- Access user profile
-
If any are missing, click + Add a permission → Microsoft Graph → Delegated permissions
Step 2: Configure SSO in Securtea
2.1 Navigate to SSO Settings
- Sign in to your Securtea dashboard
- Navigate to Settings → Organization → SSO Authentication
- Select the OIDC tab
2.2 Enter Configuration Details
Complete the following fields:
Email Domain *
- Enter your organization's email domain (e.g.,
yourcompany.com) - Users with this email domain will be redirected to Microsoft Entra ID for authentication
- Note: Only one domain is supported per SSO configuration
Issuer URL *
Format: https://login.microsoftonline.com/{tenant-id}/v2.0
- Replace
{tenant-id}with your Directory (tenant) ID from Azure Portal - Example:
https://login.microsoftonline.com/12345678-1234-1234-1234-123456789abc/v2.0
Client ID *
- Paste the Application (client) ID from Step 1.3
Client Secret *
- Paste the client secret value from Step 1.4
- This field is password-protected and won't be displayed after saving
2.3 Configure Callback URL in Azure
Before saving in Securtea:
- Copy the Callback URL shown in the Securtea form
- Format:
https://yourdomain.com/api/auth/sso/callback/oidc-{your-org-slug}
- Format:
- Return to the Azure Portal → Your App Registration → Authentication
- Under Redirect URIs, add or verify the callback URL
- Click Save in Azure Portal
2.4 Save Configuration
- Click Configure OIDC in Securtea
- Wait for the success confirmation
- Your SSO configuration is now active
Step 3: Test the Connection
After configuration:
-
In the Securtea SSO settings page, locate the Test Connection section
-
Click Test
-
The system will verify:
- The issuer URL is reachable
- The client credentials are valid
- The OIDC discovery endpoint is accessible
-
Review the test results:
- ✅ Success: Your configuration is working correctly
- ❌ Failed: Review the error message and check your configuration
User Experience
First-time SSO Users
When a user signs in with your organization's email domain for the first time:
-
They enter their email on the Securtea login page
-
They're redirected to Microsoft Entra ID
-
They sign in with their Microsoft credentials
-
Securtea automatically:
- Creates their user account
- Verifies their email (provider-verified)
- Creates or adds them to your organization
- Assigns appropriate role (admin for managers/IT, member for others)
-
They're redirected back to Securtea and signed in
Returning Users
- Users are automatically redirected to Microsoft for authentication
- After successful authentication, they're signed in immediately
- No password management required in Securtea
Important Notes
Security Considerations
- Client Secret Rotation: Microsoft client secrets expire. Set a calendar reminder to rotate before expiration
- Least Privilege: Only assign necessary API permissions in Azure
- Audit Logs: Monitor sign-in activity in both Azure and Securtea
Limitations
- One SSO Provider: Only one SSO provider (OIDC or SAML) can be configured per organization
- Single Domain: The email domain field accepts one domain only
- No Guest Users: Azure guest users may need additional configuration
Session Management
- Sessions are managed by Securtea's authentication system
- Microsoft Entra ID session policies don't directly affect Securtea sessions
- Users can sign out from Securtea independently of their Microsoft session
Troubleshooting
"Invalid Client" Error
Cause: Client ID or Client Secret is incorrect
Solution:
- Verify the Client ID matches the Application (client) ID in Azure
- Regenerate the client secret if it's expired or incorrect
- Ensure you copied the secret value, not the Secret ID
"Redirect URI Mismatch" Error
Cause: The callback URL in Azure doesn't match Securtea's callback URL
Solution:
- Copy the exact callback URL from Securtea SSO settings
- In Azure Portal → App Registration → Authentication → Redirect URIs
- Ensure the URL matches exactly (including
https://and the org slug)
"Issuer Not Found" Error
Cause: The Issuer URL is incorrectly formatted or the tenant ID is wrong
Solution:
- Verify the format:
https://login.microsoftonline.com/{tenant-id}/v2.0 - Confirm the tenant ID is correct (found in Azure Portal → Entra ID → Overview)
- Ensure
/v2.0is included at the end
Users Can't Sign In After Configuration
Cause: Email domain mismatch or user's email not verified in Microsoft
Solution:
- Verify the email domain in Securtea matches your users' email domain exactly
- Ensure users have verified email addresses in Microsoft Entra ID
- Check Azure sign-in logs for authentication failures
Test Connection Succeeds But Sign-In Fails
Cause: Scopes or permissions issue
Solution:
- In Azure Portal → App Registration → API Permissions
- Ensure
openid,email, andprofilepermissions are granted - Click Grant admin consent if permissions require it
Removing SSO Configuration
To remove SSO and revert to email/password authentication:
- Navigate to Settings → Organization → SSO Authentication
- Click Remove Configuration
- Confirm the removal
Users who signed up via SSO will need to reset their password to continue accessing their accounts.
Additional Resources
Support
If you encounter issues not covered in this guide:
- Check the test connection results for specific error messages
- Review Azure sign-in logs for authentication details
- Contact Securtea support with:
- Organization slug
- Error messages
- Screenshots of Azure configuration (redact secrets)