# Microsoft Entra ID

Microsoft Entra ID (formerly Azure AD) is a cloud-based identity and access management service that enables employees to access external resources.&#x20;

OAuth operates through a token-based authentication system, allowing users to authorize access to Microsoft Entra ID resources without sharing credentials. The user logs in to their Microsoft Entra ID account and grants permission to a third-party application to access specific resources using an access token. Subsequently, the application utilizes this token to access the authorized resources on behalf of the user, eliminating the need for the user to re-enter their login credentials.

## Configuring Microsoft Entra ID

<mark style="background-color:yellow;">Step 1:</mark> Log in at <https://portal.azure.com/#home>.&#x20;

<mark style="background-color:yellow;">Step 2:</mark> Click **Microsoft Entra ID** under the "Azure services" section.

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2F3i8mGI7S4wdHZXDLbwU5%2Fimage.png?alt=media&#x26;token=13df96b0-14e8-4ad6-bef6-84a5ae2c80ff" alt=""><figcaption></figcaption></figure></div>

{% hint style="info" %}
If the Microsoft Entra ID option is not visible from the default menu, click the arrow icon labeled "More services" and search for the service.
{% endhint %}

<mark style="background-color:yellow;">Step 3:</mark> From the **Overview** tab, copy the **Tenant ID** value and save it for later.

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FDBJX1Go3nISe6iLyqnLF%2Fimage.png?alt=media&#x26;token=24768d58-e0f0-4f3a-ae03-edd8dba5f135" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 4:</mark> Click **App registrations** under "Manage" on the left menu bar.

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FtKx82qrG3tfH1a5JG8TA%2Fimage.png?alt=media&#x26;token=9eccceb3-40c6-46e0-b928-2a7f5c8feda5" alt="" width="245"><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 5:</mark> Click **New Registration**.

<div align="left"><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FdGGZ5CAPyWgqlfgtYSTT%2Fimage.png?alt=media&#x26;token=837aa1a1-7532-44d3-b6d3-fe9d85b349ee" alt=""></div>

<mark style="background-color:yellow;">Step 6:</mark> Provide the following information:&#x20;

* **Name:** The user-facing display name for this application (this can be changed later)
* **Supported account type**: "Accounts in this organizational directory only" is the most restrictive
* **Redirect URI:** Choose "Web" from the pulldown menu, then enter the value composed of domain name + "/api/v2/authenticate/azure"

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FqybaFAtgfjcfB1KiFjgA%2Fimage.png?alt=media&#x26;token=a806529e-b311-4335-8ce7-7a6db4cf5689" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 7:</mark> Click **Register** at the bottom of the page.

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FB0b63EoLXfXFW86FMcNA%2Fimage.png?alt=media&#x26;token=de5f8682-2f4c-4dae-aa80-4ab501d61587" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 8:</mark> Copy the value for the **Application (client) ID** and save it for use later.

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FCXSKXSzrmee1FVj11H7v%2Fimage.png?alt=media&#x26;token=b77daac6-b628-4434-b119-61bd6ebd50df" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 9:</mark> Click **Certificates and Secrets** under "Manage" on the left menu bar.

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2Fd95HpzOQXzd6K8y92i0G%2Fimage.png?alt=media&#x26;token=f03968c3-3cfa-4d24-924b-0e2e693408c9" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 10:</mark> Click **New client secret**.&#x20;

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FXMiUXywGJ0ws1sqPoUP8%2Fimage.png?alt=media&#x26;token=93083470-a9f4-44ba-a8af-e6315b7aebf0" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 11:</mark> Enter a value for **Description** and select the desired expiration date. Click **Add**.

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FUI8Q0gFbKvKT518wzKXo%2Fimage.png?alt=media&#x26;token=701338c1-55fe-467f-a3c9-e39a9ded6457" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 12:</mark> A new secret appears on the page under the **Client Secrets** tab. Copy the value for use later.

{% hint style="warning" %}
Client secret values cannot be viewed except immediately after creation. Be sure to save the secret when created before leaving the page.
{% endhint %}

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2Fp07AlFoF0tyWHzRKUQj7%2Fimage.png?alt=media&#x26;token=5e53b61c-e831-40a5-9d51-b1a52ad19741" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 13:</mark> Click **Token Configuration** from the left menu bar.

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2F0lZZQkOllRHnVTGoPzEh%2Fimage.png?alt=media&#x26;token=5f3d9900-d657-437b-96f6-26b28b166cd0" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 14:</mark> Click **Add optional claim**.

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2F52V7CkMXJP4bpbm9H5YR%2Fimage.png?alt=media&#x26;token=32b30fda-2ac0-4d14-a2c2-05059d70b792" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 15:</mark> Choose "ID" for the **Token type**, then select "email" from the list of options that appears after clicking "ID." Click **Add**.

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FDfeDl8detpHqfi3X0G5B%2Fimage.png?alt=media&#x26;token=c4ea8166-1fc0-48df-948a-2003ae0713a6" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 16:</mark> Navigate back to the Microsoft Entra ID home page (see Step 2) and click **Users** from the left nav bar.

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FoLumurCaZogRJijtH04M%2Fimage.png?alt=media&#x26;token=62a5c7b2-15f4-4ba3-9447-69097d22c687" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 17:</mark> Validate that the desired users exist in the list. Add new users as needed.&#x20;

{% hint style="info" %}
Users, not members of the organization, can be invited by clicking **New user** from the toolbar. They must have a Microsoft account to accept.&#x20;
{% endhint %}

<mark style="background-color:yellow;">Step 18:</mark> Log in to PlexTrac as an admin.

<mark style="background-color:yellow;">Step 19:</mark> Navigate to the **Admin Dashboard**. Click **Security** under "Security & User Management."

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2F96bGYUiO52SKn6OrnCjm%2Fimage.png?alt=media&#x26;token=72b7f09e-aca7-4bb2-a8a0-5a4d80a52620" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 20:</mark> Click **Authentication Methods** under "Authentication."&#x20;

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FEfwRdo6Asah3wAfSr4XF%2Fimage.png?alt=media&#x26;token=f9a501b8-09b6-4c1c-8eea-13b5bf7b5d50" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 21:</mark> From the **OAuth Providers** tab, select "Azure" from the dropdown menu "Authentication Providers."

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2F2Is56WKZDoHoikxzNN9V%2Fimage.png?alt=media&#x26;token=08c734ab-5585-4a0b-95f1-807cbe933936" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 22:</mark> Enter the appropriate values for the following fields:

* **Provider URL:** Enter[ "https://login.microsoftonline.com](https://login.microsoftonline.com)."
* **Provider Tenant ID:** Enter the "Directory (tenant) ID" value copied in Step 3.
* **Identifier:** Enter the "Application (client) ID" value copied in Step 8.
* **Secret**:  Enter the secret value copied in Step 14.

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FxGXRIjkFFvRscHbEZMTN%2Fimage.png?alt=media&#x26;token=e8a63b23-9ded-47f0-a878-7506da1f226a" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 23:</mark> Toggle on the **Enabled** button. Click **Save**.&#x20;

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FGrl9xgOsfSxuNCDDIn3G%2Fimage.png?alt=media&#x26;token=5cce0a32-81fb-4002-948d-845eaa0f8f29" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 24:</mark> Return to "Security & User Management" and click **Users**.

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FYNLgOHNBXUa7EuaMKYEp%2Fimage.png?alt=media&#x26;token=a7dfca3a-218b-40f3-9620-e7323c7f843e" alt=""><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 25:</mark> Under the column header "Authentication Provider," select the desired user and change the value to "Azure."

<div align="left"><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FzmVstNwj3udwxuido9XF%2Fimage.png?alt=media&#x26;token=128a1f64-8822-4830-b1cb-a5deafe02a3a" alt=""></div>

{% hint style="info" %}
Each user has to be configured individually.
{% endhint %}
