You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# optional: Microsoft Entra ID administrator group id, activated if not set
44
53
# MICROSOFT_ENTRA_ID_ADMINISTRATOR_GROUP_ID=
45
54
46
-
# Note: For Microsoft Entra ID, you need to:
47
-
# 1. Create an app registration
48
-
# - Go to Azure Portal -> Microsoft Entra ID -> App Registrations -> New Registration
49
-
# - Fill in the name and select the supported account types
50
-
# - Add a "Web" redirect URI: http://localhost:3000/api/users/oauth/microsoft-entra-id/callback
51
-
# - When created, go to API Permissions -> Add a permission -> Microsoft Graph -> Delegated permissions -> Select the ones you need, e.g. email, openid, profile and offline_access -> Add permissions
52
-
# - Optional: If you do not want users to have to give consent to your app everytime they login: Click on Grant admin consent for {tenant} -> Yes
53
-
# - Optional: If you want groups to be part of your token(s), you can go to Token configuration -> Add groups claim -> Select the groups you want to add -> Save
54
-
# - Go to Certificates & secrets -> Client secrets -> New client secret -> Add a description -> Expires -> Add -> Copy the secret (it will only be shown once) -> And save the secret somewhere safe or add it to your .env file
55
-
# You can read a little about registering apps here as well: https://learn.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app
Note: For Microsoft Entra ID, you need to xreate an app registration
22
+
- Go to Azure Portal -> Microsoft Entra ID -> App Registrations -> New Registration
23
+
- Fill in the name and select the supported account types
24
+
- Add a "Web" redirect URI: http://localhost:3000/api/users/oauth/microsoft-entra-id/callback
25
+
- When created, go to API Permissions -> Add a permission -> Microsoft Graph -> Delegated permissions -> Select the ones you need, e.g. email, openid, profile and offline_access -> Add permissions
26
+
- Optional: If you do not want users to have to give consent to your app everytime they login: Click on Grant admin consent for {tenant} -> Yes
27
+
- Optional: If you want groups to be part of your token(s), you can go to Token configuration -> Add groups claim -> Select the groups you want to add -> Save
28
+
- Go to Certificates & secrets -> Client secrets -> New client secret -> Add a description -> Expires -> Add -> Copy the secret (it will only be shown once) -> And save the secret somewhere safe or add it to your .env file
29
+
30
+
You can read a little about registering apps here as well: https://learn.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app
0 commit comments