Skip to main content

Configuring Azure AD SSO with FusionAuth

Step-by-step guide to integrate Microsoft Azure Active Directory (now Microsoft Entra ID) with FusionAuth for Single Sign-On (SSO) authentication in TeamPassword Enterprise.

TeamPassword avatar
Written by TeamPassword
Updated yesterday

This guide walks you through the complete setup process for integrating Microsoft Azure Active Directory (now Microsoft Entra ID) with FusionAuth for Single Sign-On (SSO) authentication.

Summary of the steps:

  1. Subscribe to Enterprise

  2. Azure configuration

  3. FusionAuth configuration (TeamPassword engineers)

  4. Migrate to Enterprise SSO

Overview

This configuration enables customers to authenticate with TeamPassword using their Microsoft Azure credentials. The setup involves two main parts:

  1. Configuring Azure AD to register TeamPassword as an application

  2. Setting up FusionAuth to use Azure AD as an identity provider


Part 1: Azure AD Configuration

Prerequisites

  • Administrative permissions in your Azure tenant

  • Users must have valid email addresses in their Azure AD profile (required for TeamPassword login)

Step 1: Access Microsoft Entra ID

  1. Navigate to Microsoft Entra ID (formerly known as Azure Active Directory)

  2. Verify that your tenant and users are properly configured

    • Users should have a one-to-one mapping with TeamPassword accounts

    • ⚠️ Important: Each user must have a valid email address in their profile

Step 2: Register the Application

  1. In Microsoft Entra ID, go to App registrations

  2. Click New registration

  3. Configure the application with the following settings:

    • Name: TeamPassword

    • Supported account types: Single tenant

    • Redirect URI:

      • Type: Web

      • URI: https://teampassword.fusionauth.io/oauth2/callback

  4. Click Register

Step 3: Collect Application Credentials

After registration, you'll need to collect three pieces of information to share with your FusionAuth administrator:

  1. On the application overview page, note the following:

    • Application (client) ID

    • Directory (tenant) ID

  2. Save these values securely - you'll need to share them with your FusionAuth administrator.

Step 4: Create Client Secret

  1. Navigate to Manage > Certificates & secrets in the left menu

  2. Click New client secret

  3. Configure the secret:

    • Description: TeamPassword SSO Secret

    • Expires: 12 months

    • Click Add

    • Immediately copy the "Value" (not the Secret ID)

    • ⚠️ Important: This secret value will only be displayed once. Copy it now and store it securely.

Step 5: Share Credentials

Securely send the following three values to your FusionAuth administrator:

  • Application (client) ID

  • Directory (tenant) ID

  • Client secret value

Did this answer your question?