apps/docs/content/guides/integrate/identity-providers/azure-ad-oidc.mdx
import GeneralConfigDescription from './_general_config_description.mdx'; import Intro from './_intro.mdx'; import CustomLoginPolicy from './_custom_login_policy.mdx'; import IDPsOverview from './_idps_overview.mdx'; import TestSetup from './_test_setup.mdx'; import Activate from './_activate.mdx';
<Intro components={props.components} provider="Entra ID (former Azure Active Directory)"/>Click on the ZITADEL Callback URL to copy it to your clipboard. You will have to paste it in the Entra ID Client later.
You need to have access to an Entra ID Tenant. If you do not yet have one follow this guide from Microsoft to create one for free.
Generate a new client secret to authenticate your user.
To allow ZITADEL to get the information from the authenticating user you have to configure what kind of optional claims should be returned in the token.
To be able to get all the information that ZITADEL needs, you have to configure the correct permissions.
Go back to the Microsoft provider template you opened before in ZITADEL. Add the client ID and secret created before on your Entra ID application.
You can optionally configure the following settings. A useful default will be filled if you don't change anything.
Scopes: The scopes define which scopes will be sent to the provider, openid, profile, and email are prefilled.
This information will be taken to create/update the user within ZITADEL. Make sure to also add User.Read. ZITADEL ensures that at least openid and User.Read scopes are always sent.
Email Verified: Entra ID doesn't send the email verified claim in the users token, if you don't enable this setting. The user is then created with an unverified email, which results in an email verification message. If you want to avoid that, make sure to enable "Email verified". In that case, the user is created with a verified email address.
Tenant Type: Configure the tenant type according to what you have chosen in the settings of your Entra ID application previously.
Tenant ID: If you have selected Tenant ID as Tenant Type, you have to enter the Directory (Tenant) ID into the Tenant ID field, copied previously from the Azure App settings.
<GeneralConfigDescription components={props.components} provider_account="Microsoft account" />