Azure Entra ID SSO Setup Guide
Complete instructions to configure Single Sign-On for your organization
Overview
This guide will walk you through setting up Azure Entra ID (formerly Azure Active Directory) Single Sign-On integration with your SSO Demo configuration.
What You'll Configure
- Azure App Registration - Creates an identity for your application in Azure
- Redirect URI - Tells Azure where to send users after authentication
- SSO Configuration - Links your Azure app to this demo platform
Authentication Flow
- User clicks "Sign In with Microsoft" on your test page
- User is redirected to Microsoft login
- After authentication, Microsoft redirects back with an authorization code
- The app exchanges the code for tokens and displays user information
Prerequisites
Before you begin, make sure you have:
- Azure Account - Access to an Azure subscription with Entra ID
- Admin Access - Permission to create App Registrations in your Azure tenant (or have an admin do it for you)
- SSO Demo Account - A registered account on this platform
Note: If you don't have admin access to create App Registrations, contact your Azure administrator to create one for you.
Azure Portal Setup
1Access Azure Portal
- Go to portal.azure.com
- Sign in with your Azure account
- In the search bar, type
App registrationsand select it
2Create New App Registration
- Click + New registration
- Enter a name for your app (e.g., "SSO Demo App")
- Under Supported account types, select one of:
- Single tenant - Only users in your organization
- Multitenant - Users in any Azure AD organization
- Multitenant + Personal - Includes personal Microsoft accounts
- Leave Redirect URI blank for now (we'll add it next)
- Click Register
3Configure Redirect URI (Critical Step)
Important: The redirect URI MUST be configured as a Single-page application (SPA) type, NOT "Web". This is the most common source of errors.
- In your App Registration, go to Authentication in the left menu
- Click + Add a platform
- Select Single-page application (NOT "Web")
- Enter your Redirect URI from the SSO Demo app:
https://www.ssodemoapp.com/t/YOUR_CONFIG_IDReplace
YOUR_CONFIG_IDwith the 8-character ID shown when you create a configuration - Click Configure
4Copy Application (Client) ID
- Go to Overview in your App Registration
- Copy the Application (client) ID - you'll need this
- If using single tenant, also copy the Directory (tenant) ID
5Configure API Permissions (Optional)
By default, your app can read basic user profile information. For additional data:
- Go to API permissions
- Click + Add a permission
- Select Microsoft Graph
- Choose Delegated permissions
- Add permissions as needed:
User.Read- Basic profile (included by default)profile- Extended profile infoemail- User's email address
- Click Add permissions
Azure setup complete! You now have an App Registration ready to use with SSO Demo.
App Configuration
1Create SSO Configuration
- Log in to SSO Demo App
- Click New Configuration
- Note the Redirect URI shown at the top - you need this in Azure
- Fill in the configuration:
Field Description Configuration Name A friendly name (e.g., "Production SSO") Description Optional description Application (Client) ID The GUID from Azure App Registration Tenant Type Must match your Azure app's supported account types - Click Save Configuration
2Add Redirect URI to Azure
After saving, copy the Redirect URI from your configuration card and add it to Azure:
- Go back to Azure Portal → Your App Registration → Authentication
- Under Single-page application, add the redirect URI
- Click Save
Remember: The redirect URI in Azure must exactly match the one shown in your configuration, including the protocol (https://) and path.
Testing SSO
1Open Test URL
- From your configuration card, click Open to launch the test page
- Or share the URL with users who need to test
2Sign In
- Click Sign In with Microsoft
- A popup will appear for Microsoft authentication
- Enter your credentials and complete any MFA if required
- Accept any consent prompts
3Verify Connection
After successful authentication, you should see:
- Status changes to Connected (green)
- Your name and email displayed
- Job title and department (if available in your directory)
- Profile photo (if you have one in Azure AD)
Device Code Flow (Alternative)
If popups don't work (e.g., embedded browsers), use Device Code:
- Click Device Code Login
- Note the code displayed
- On any device, go to microsoft.com/devicelogin
- Enter the code and sign in
- The test page will automatically update when complete
Troubleshooting
Common Errors
| Error | Solution |
|---|---|
AADSTS50011: The redirect URI does not match |
The redirect URI in Azure doesn't match exactly. Check for typos, trailing slashes, and ensure it's added as SPA type. |
Cross origin token redemption is permitted only for SPA |
Your redirect URI is configured as "Web" type instead of "Single-page application". Delete it and re-add as SPA. |
AADSTS700054: response_type 'token' is not supported |
Same as above - redirect URI must be SPA type, not Web. |
AADSTS65001: User or admin has not consented |
The user needs to consent to permissions, or an admin needs to grant tenant-wide consent. |
AADSTS700016: Application not found |
The Client ID is incorrect or the app was deleted. Verify the ID in Azure. |
AADSTS90002: Tenant not found |
The Tenant ID is incorrect. Use "organizations" for multi-tenant or verify your tenant ID. |
| Popup blocked | Allow popups for this site in your browser, or use Device Code flow instead. |
Checklist
If authentication isn't working, verify:
- ✓ Redirect URI is added as Single-page application (not Web)
- ✓ Redirect URI matches exactly (including https://)
- ✓ Client ID is copied correctly (no extra spaces)
- ✓ Tenant type matches your Azure app's supported account types
- ✓ User has permission to sign in to the app
- ✓ Popups are allowed in your browser
Still Need Help?
If you're still experiencing issues:
- Check the browser console (F12 → Console) for detailed error messages
- Verify all settings match between Azure and your configuration
- Try in an incognito/private browser window
- Clear browser cache and cookies