docs/versioned_docs/version-7.8.x/configuration/providers/ms_azure_ad.md
:::note This is the legacy and deprecated provider for Azure, use Microsoft Entra ID if possible. :::
| Flag | Toml Field | Type | Description | Default |
|---|---|---|---|---|
--azure-tenant | azure_tenant | string | go to a tenant-specific or common (tenant-independent) endpoint. | "common" |
--resource | resource | string | The resource that is protected (Azure AD only) |
IMPORTANT: Even if this permission is listed with "Admin consent required=No" the consent might actually
be required, due to AAD policies you won't be able to see. If you get a "Need admin approval" during login,
most likely this is what you're missing!
4. Next, if you are planning to use v2.0 Azure Auth endpoint, go to the Manifest page and set "accessTokenAcceptedVersion": 2
in the App registration manifest file.
5. On the Certificates & secrets page of the app, add a new client secret and note down the value after hitting Add.
6. Configure the proxy with:
--provider=azure
--client-id=<application ID from step 3>
--client-secret=<value from step 5>
--azure-tenant={tenant-id}
--oidc-issuer-url=https://sts.windows.net/{tenant-id}/
--provider=azure
--client-id=<application ID from step 3>
--client-secret=<value from step 5>
--azure-tenant={tenant-id}
--oidc-issuer-url=https://login.microsoftonline.com/{tenant-id}/v2.0
Notes:
https://login.microsoftonline.com/{tenant-id}/v2.0) as --oidc_issuer_url, in conjunction
with --resource flag, be sure to append /.default at the end of the resource name. See
https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-permissions-and-consent#the-default-scope for more details.