You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. Copy the `Application (client) ID`, `Client secret Value`, and
80
-
`AzureBaseUrl` to a safe place.
52
+
### Microsoft Entra ID (Azure Active Directory)
53
+
54
+
1. Go to [Microsoft Entra admin center](https://entra.microsoft.com) → **Microsoft Entra ID → Applications → App registrations → New registration**.
55
+
1. Name the app, select the supported account types, and click **Register**.
56
+
Note the **Application (client) ID** and **Directory (tenant) ID**.
57
+
1. Go to **Authentication → Add a platform → Web**. Add the redirect URI
58
+
`<QuiltWebHost>/oauth-callback`. Under **Implicit grant and hybrid flows**,
59
+
enable **ID tokens** (required — login will fail without it). Click **Save**.
60
+
1. Go to **Certificates & secrets → New client secret**. Copy the **Value**
61
+
immediately — it is not shown again. (Do not use the Secret ID.)
62
+
1. Go to **API permissions → Add a permission → Microsoft Graph → Delegated**.
63
+
Add `openid`, `profile`, `email`, `offline_access`, and `User.Read`, then
64
+
click **Grant admin consent**. Without admin consent, each user is typically
65
+
prompted to grant these permissions on their first login; granting admin consent
66
+
approves them tenant-wide (subject to your org's policies) and avoids end-user prompts.
67
+
1. Your `AzureBaseUrl` is `https://login.microsoftonline.com/<TENANT_ID>/v2.0`.
68
+
Reference [Microsoft identity platform and OpenID Connect protocol](https://learn.microsoft.com/en-us/entra/identity-platform/v2-protocols-oidc)
69
+
and [National clouds](https://learn.microsoft.com/en-us/entra/identity-platform/authentication-national-cloud)
70
+
for non-standard endpoints.
71
+
> **`AzureBaseUrl` must end in `/v2.0`. Append it if missing.**
72
+
1. For SSO Permissions Mapping:
73
+
- Create security groups in Entra and assign users.
74
+
- In the app registration, go to **Token configuration → Add groups claim** (or **Edit** if it already exists) and configure it to emit **Group IDs** in the **ID token**.
75
+
- Create a [configuration file](./advanced-features/sso-permissions.md) to map Entra Group IDs to Quilt roles.
0 commit comments