website/src/app/kb/authenticate/entra/readme.mdx
import Alert from "@/components/DocsAlert"; import PlanBadge from "@/components/PlanBadge"; import SupportOptions from "@/components/SupportOptions";
<PlanBadge plans={["starter", "team", "enterprise"]}>
Firezone supports authenticating users with Microsoft Entra ID using Firezone's public OAuth client. You can configure multiple Entra providers — one per tenant — to authenticate users from different organizations.
<Alert color="info"> Looking for directory sync? See the [Entra directory sync guide](/kb/directory-sync/entra) to automatically provision users and groups from Microsoft Entra ID. </Alert>To enable Entra authentication:
Settings -> Authentication in your admin portal.Users will now see this provider as an option on the Firezone sign-in page.
Firezone uses a public OAuth client to authenticate users with Microsoft Entra ID. When a user signs in:
iss and sub claims from Entra. For
users provisioned via directory sync, this
identity already exists. For manually created users, Firezone matches by
email on first sign-in and saves the Entra identity for subsequent sign-ins.No app registration or client secret setup is required on your end.
Firezone requests the following scopes from Microsoft:
openid — Required for authenticationemail — Used to match users on first sign-inprofile — Used for the user's display nameoffline_access — Used to maintain the sessionFirezone does not access your email, calendar, files, or any other Microsoft 365 data.
You can configure multiple Entra providers to authenticate users from different Microsoft tenants. Each provider is tied to a single tenant ID.
To add another tenant:
Settings -> Authentication in your admin portal.Users from each tenant will see a separate sign-in option on the Firezone sign-in page.
Entra admins can control which users and groups are allowed to sign into Firezone by configuring user assignment on the Firezone Enterprise Application in your tenant.
To restrict access:
With assignment required enabled, only users and groups explicitly assigned to the Firezone application will be able to sign in.
<Alert color="info"> On Enterprise plans, [directory sync](/kb/directory-sync/entra) group assignments are managed separately on the **Firezone Directory Sync** Enterprise Application. See the [Entra directory sync guide](/kb/directory-sync/entra) for details. </Alert> <Alert color="warning"> If you enable **Assignment required** without assigning any users or groups, all users in that tenant will be blocked from signing into Firezone. </Alert>Users must exist in Firezone before they can sign in with Entra. You can:
If a user sees a "user not found" or similar error when signing in, it means no matching user exists in Firezone. The user must be created manually or provisioned via directory sync before they can sign in.
If a user sees "AADSTS50105" or "You cannot access this application", it means the Entra admin has enabled user assignment and the user is not assigned to the Firezone application. See Restricting access above.
If a user authenticates with a Microsoft account from a different tenant than the one configured, they'll see an error. Ensure the user is signing in with an account from the correct tenant, or add an additional Entra provider for their tenant.
Users can revoke Firezone's access to their Microsoft account from their Microsoft account security settings. Revoking access does not delete the user from Firezone or end their active sessions, but they will need to re-authorize on their next sign-in.
<SupportOptions />