SSO in Entra ID
Configuring Entra ID as an external identity provider lets users sign in with their Microsoft work accounts. Authentication—including single sign-on, multi-factor authentication, and conditional access—is handled by Entra ID.
This approach centralises user management and streamlines onboarding.
Before You Begin
Open the configuration form in a new tab. You'll fill it in as you complete each step below.
Recommended setup
Work with three browser tabs open:
- Azure Portal or Microsoft Entra admin centre — the menus are the same
- This page — the instructions you're following
- The form — where you'll enter the values
Form Fields Summary
As you complete the steps below, you'll collect these values for the form:
| Form Field | Where to Find It | Step |
|---|---|---|
| Client Key | Application (client) ID on Overview page | 1 |
| Authorisation Endpoint URL | OAuth 2.0 authorization endpoint (v2) | 1 |
| Access Token URL | OAuth 2.0 token endpoint (v2) | 1 |
| Issuer | "issuer" value from OpenID Connect metadata JSON |
1 |
| Client Secret | OneTimeSecret link containing your secret | 2 |
Step 1: Register the application
In the Azure Portal or Microsoft Entra admin centre, navigate to Microsoft Entra ID > App registrations:
- Click New registration
- Configure the basic settings:
- Name: Enter a name (e.g., "SIDRA Floating Licence")
- Supported account types: Select "Accounts in this organizational directory only"
- Redirect URI: Select Web and enter:
- Click Register
Copy the configuration values
After registration, you'll land on the app's Overview page:
- Copy the Application (client) ID
- → Paste into form field: Client Key
- Click the Endpoints button (top of the page)
- Copy these endpoint URLs:
- OAuth 2.0 authorization endpoint (v2) → Form field: Authorisation Endpoint URL
- OAuth 2.0 token endpoint (v2) → Form field: Access Token URL
- To find the Issuer value:
- Copy the OpenID Connect metadata document URL
- Open it in a new browser tab (it displays a JSON file)
- Find the
"issuer"field and copy its value → Form field: Issuer
Configure the logout URL
- Go to Authentication (left sidebar)
- Scroll to Front-channel logout URL and enter:
- Click Save
Step 2: Create a client secret
- Go to Certificates & secrets (left sidebar)
- Under Client secrets, click New client secret
- Enter a description and select an expiry period
- Click Add
Copy the secret immediately
The secret value is only displayed once. If you navigate away, you cannot retrieve it.
- Copy the Value (not the Secret ID)
- Go to onetimesecret.com and create a secure link for the secret
- Paste the OneTimeSecret link → Form field: Client Secret
Step 3: Add API permissions
- Go to API permissions (left sidebar)
- Click Add a permission
- Select Microsoft Graph > Delegated permissions
- Search for and select these permissions (may appear under "OpenID permissions" in some tenants):
emailopenidprofile
- Click Add permissions
Grant admin consent
Click Grant admin consent for [your organisation] and confirm. The status for each permission should show a green tick.
Step 4: Submit the form
Before you submit — common mistakes
- Client Secret: Copy the Value, not the Secret ID (it's only shown once)
- Redirect URI: Must be exactly
https://licensing.sidrasolutions.com/user/oauth20/cb - Admin consent: Ensure all permissions show a green tick
- Assignment required: If enabled, you must assign users/groups or sign-in will fail
Return to the configuration form tab and:
- Verify all SSO Configuration Values are filled in
- Complete the Customer Information section
- Click Submit
You'll receive a confirmation email. SIDRA Support will complete the server-side configuration and notify you when SSO is ready for testing.
Restricting access (optional)
By default, all users in your organisation can sign in. To restrict access to specific users or groups:
- In the Azure Portal, go to Enterprise applications
- Find and select your registered application
- Go to Properties and set Assignment required? to Yes
- Go to Users and groups and assign access to specific users or groups
Need help?
If you encounter any issues, contact SIDRA Support.