This guide walks you through the complete setup process for integrating Microsoft Entra ID (formerly Azure AD) with TeamPassword Enterprise for Single Sign-On (SSO) authentication.
Summary of the steps:
Subscribe to an Enterprise plan
Configure Entra ID
Configure Authentication platform
Enable Enterprise SSO
Sign in with Enterprise SSO
Overview
This configuration enables customers to authenticate with TeamPassword using their Microsoft Entra ID credentials. Once set up, users can sign in through the Enterprise SSO button without needing to enter their separate TeamPassword email and password.
Note: SAML ≠ SSO.
TeamPassword’s Enterprise SSO integration uses the OpenID Connect (OIDC) protocol, a modern, industry-standard authentication framework. SAML is a different protocol and is not required. To configure Enterprise SSO, customers simply need to create an OIDC application in Microsoft Entra ID and use those credentials to complete the setup.
Part 1: Subscribe to an Enterprise plan
Enterprise SSO is available to customers subscribed to one of our Enterprise plans.
If you are currently on an active Standard plan, you can upgrade to Enterprise from your team’s Billing page.
If you are on a legacy bulk plan and do not see the option to upgrade to Enterprise, please contact TeamPassword Support for assistance.
Part 2: Entra ID Configuration
Prerequisites
To configure Enterprise SSO with TeamPassword using Microsoft Entra ID as your identity provider, customers must have:
An active Microsoft Entra ID tenant
Your team must have an existing Entra ID account (tenant) via the Azure Portal. This is required to manage users and register applications.Administrative access to the Entra ID tenant
The person performing the setup must have sufficient permissions (e.g., Global Administrator, Application Administrator, or Cloud Application Administrator) to register and configure applications.Ability to create an OIDC (OpenID Connect) application
TeamPassword’s SSO integration uses the OpenID Connect (OIDC) protocol. During setup, you will need to:Create an App Registration
Configure redirect (callback) URLs
Generate a Client ID
Generate a Client Secret
Provide your Tenant ID
Users provisioned in Entra ID
Users who need access to TeamPassword must already exist in your Entra ID tenant.
Step 1: Provision Users
Sign in to the Microsoft Azure Portal
Navigate to Microsoft Entra ID
Verify that your tenant and users are properly configured.
Users must have a one-to-one mapping with their TeamPassword accounts. The email address in Microsoft Entra ID must match the email address associated with their TeamPassword account.
For internal users created directly in the tenant, the email/UPN used for login must exactly match the user’s TeamPassword account email. For example, if a user’s Entra ID login is[email protected]but their TeamPassword account email is[email protected], authentication will fail because the email addresses do not match.
Similarly, for external users invited into the Entra ID tenant, the external email address associated with their Entra ID account must match the email address of their TeamPassword account.
⚠️ Important: The Entra ID login email field must be populated for each user. This value is blank by default. If it is missing, the user will not be able to authenticate via SSO.
Step 2: Register the Application
In Microsoft Entra ID, go to App registrations
Click New registration
Configure the application with the following settings:
Name: TeamPassword
Supported account types: Single tenant
Redirect URI:
Type: Web
URI:
https://teampassword.fusionauth.io/oauth2/callback
Click Register
Step 3: Collect Application Credentials
After registration, you'll need to collect three pieces of information to share with TeamPassword Support:
On the application overview page, note the following:
Application (client) ID
Directory (tenant) ID
Save these values securely — you'll need to share them with TeamPassword Support.
Step 4: Create Client Secret
Navigate to Manage > Certificates & secrets in the left menu
Click New client secret
Configure the secret:
Description: TeamPassword SSO Secret
Expires: 12 months
Click Add
Immediately copy the "Value" (not the Secret ID)
⚠️ Important: This secret value will only be displayed once. Copy it now and store it securely.
Step 5: Save Credentials
To make things easier in the next step, save the above credentials in a record.
In your TeamPassword account, create a record named:
Enterprise SSO Setup Credentials – <your-team-name>
⚠️ Important: Be sure to include your team/organization name in the record title.Copy and paste the following into the notes section, replacing the values with your actual values:
These are our Enterprise SSO setup credentials to be shared with the TeamPassword support team. Please do not delete this record until Enterprise SSO migration is complete.
Application (client) ID: <your Client ID>
Directory (tenant) ID: <your Tenant ID>
Client secret value: <your Client Secret>Click Save
Part 3: Authentication Platform Configuration
Using the Entra ID credentials collected in the previous step, our team will now need to complete the remaining configuration in our authentication platform.
Step 1: Share credentials with TeamPassword Support
Please contact TeamPassword Support at [email protected] to inform us that you have completed your Entra ID setup and have the credentials ready to share.
Once we have confirmed your email, create a one-time share of the credentials record you just created and send the link to [email protected]. Since the link is only valid for 24 hours, we need to be informed so that we can look out for it.
Note: The Allow one-time secret links feature must be enabled in the security settings in order to be able to share shared records. Private records can always be shared.
Step 2: Await confirmation from TeamPassword Support
Once we receive your credentials, we will finish Enterprise SSO configuration in our authentication platform and contact you once complete.
Part 4: Enable Enterprise SSO
Once configuration is complete, finalize the setup by enabling Enterprise SSO from within TeamPassword.
Step 1: Owner migration
The team owner must first enable Enterprise SSO for their own account from their Account Settings.
Step 2: Member migration
Once the owner has enabled Enterprise SSO, the rest of the team members will be able to enable it for their own accounts by following the same steps. Because users can belong to multiple teams but can only be associated with one Enterprise SSO–enabled team at a time, Enterprise SSO must be enabled individually by each user.
Part 5: Sign in with Enterprise SSO
With all steps complete, you can now sign in using Enterprise SSO from your new workspace URL. We recommend bookmarking this URL for easy access in the future.
Alternatively, you can sign in from the standard sign-in page by clicking the Enterprise SSO button. You will be prompted to enter your workspace subdomain before being redirected to sign in.
















