docs/content/stable/yugabyte-cloud/managed-security/managed-authentication/federated-entra.md
Using federated authentication, you can use an enterprise IdP to manage access to your YugabyteDB Aeon account. After federated authentication is enabled, only Admin users can sign in using password authentication.
Currently, YugabyteDB Aeon supports IdPs exclusively using the OIDC (OpenID Connect) protocol.
<ul class="nav nav-tabs-alt nav-tabs-yb"> <li> <a href="../federated-entra/" class="nav-link active"> Microsoft Entra </a> </li> <li> <a href="../federated-ping/" class="nav-link"> PingOne </a> </li> <li> <a href="../federated-okta/" class="nav-link"> Okta </a> </li> <li> <a href="../federated-jump/" class="nav-link"> JumpCloud </a> </li> <li> <a href="../federated-custom/" class="nav-link"> Custom </a> </li> </ul>Before configuring federated authentication, be sure to allow pop-up requests from your IdP; the provider may need to confirm your identity in a new window.
Before enabling federated authentication in YugabyteDB Aeon, you must configure your IdP and obtain the necessary credentials.
To use Entra for your IdP, you need to register an application with Microsoft Entra so the Microsoft identity platform can provide authentication and authorization services for your application. Configure the application as follows:
Provide a name for the application.
Set the sign-in audience for the application to Accounts in any organizational directory (Multitenant).
Set the Redirect URI platform to Web, and the URI to the following:
https://yugabyte-cloud.okta.com/oauth2/v1/authorize/callback
Use your own Entra account to test the connection. For more information, refer to Register an application with the Microsoft identity platform in the Microsoft documentation.
In addition, to configure Entra federated authentication in YugabyteDB Aeon, you need the following:
Refer to Create a new client secret in the Microsoft documentation.
To configure federated authentication in YugabyteDB Aeon, do the following:
At this point, you will be redirected to sign in to your IdP to test the connection. If the test connection is successful, federated authentication is enabled.