Configure Entra ID as an OIDC IdP
Overview
Use this guide to configure Microsoft Entra ID as an OpenID Connect (OIDC) identity provider for Atria. This is the recommended method for Atria 15.31 and newer, replacing the legacy Azure AD login configuration path. The outcome is a standards-based SSO integration that can be used for single-customer or inherited reseller models.
Visual Walkthrough
For a full picture-based walkthrough, see: Atria Configuration - Configure Entra ID as an iDP provider (Scribe)
Before You Start
Prepare the following before configuration:
- Access to Microsoft Entra admin center (
https://entra.microsoft.com) - Atria URL for your environment
- Target customer/reseller context in Atria where the provider will be created
- Secure storage location for client secret
You will need both callback URIs:
https://<atria-host>/oidc/callbackhttps://<atria-host>/oidc/link/callback
Step 1: Create the Entra App Registration
- In Entra ID, go to
App registrations > New registration. - Set a name (for example:
Atria OIDC Connection). - Set supported account type based on your design:
- Multi-tenant/shared model: organizational directories (multi-tenant)
- Single-tenant/customer-specific model: this directory only
- Add an initial Web redirect URI:
https://<atria-host>/oidc/link/callback
- Click Register.
Step 2: Configure Redirect URIs
- Open the app registration and go to
Authentication. - Add the second Web redirect URI:
https://<atria-host>/oidc/callback
- Confirm both redirect URIs are listed and saved.
Step 3: Create a Client Secret
- Go to
Certificates & secrets. - Click New client secret.
- Add description and expiry.
- Save both values immediately:
- Secret value
- Secret ID (for reference)
The secret value is only shown once.
Step 4: Configure API Permissions
- Go to
API permissions > Add a permission > Microsoft Graph > Delegated permissions. - Add required permissions:
openidemailUser.Read
- Grant admin consent for the tenant.
Step 5: Capture App Values
From the app Overview, record:
Application (client) ID- Tenant context (single-tenant issuer or multi-tenant issuer model)
From Entra metadata, use this well-known endpoint pattern:
https://login.microsoftonline.com/<tenant-id-or-organizations>/v2.0/.well-known/openid-configuration
Step 6: Add the Provider in Atria
- In Atria, navigate to
Customer > Identity Provider Configurations. - Click Add and complete:
- Display Name
- Client ID
- Client Secret
- Wellknown Endpoint
- Access Level (
Current CustomerorCurrent and All Sub-Customers)
- Optional: set as Default if this should enforce SSO for that scope.
- For auto-linking, recommended mapping for Entra ID:
- OIDC Claim:
preferred_username - User Property:
UPN
- OIDC Claim:
- Save the provider.
Validation
After saving, validate:
- Well-known endpoint validation succeeds in Atria.
- Provider appears for expected customer scope.
- Login redirects to Entra ID and returns successfully to Atria.
- First successful login creates/uses expected user linking behavior.
Reference
Scribe walkthrough: