Entra ID OAuth authentication
Allows users to authenticate to authentik using their Entra ID credentials, by configuring Entra ID as a federated identity provider via OAuth2.
Preparation
The following placeholders are used in this guide:
authentik.companyis the FQDN of the authentik installation.
Entra ID configuration
To integrate Entra ID with authentik you will need to create an App Registration in the Entra ID portal.
-
Log in to Entra ID using a global administrator account.
-
Navigate to Applications > App registrations.
-
Click New registration and set the following required configurations:
- Name: provide a descriptive name (e.g.
authentik). - Under Supported account types: select the account type that applies to your use-case (e.g.
Accounts in this organizational directory only (Default Directory only - Single tenant)). - Under Redirect URI:
- Platform:
Web - URI:
https://authentik.company/source/oauth/callback/entra-id/
- Platform:
- Name: provide a descriptive name (e.g.
-
Click Register. Once the registration is complete, the Overview tab of the newly created authentik app will open. Take note of the
Application (client) ID. If you selectedAccounts in this organizational directory only (Default Directory only - Single tenant)as the Supported account types, also note theDirectory (tenant) ID. These values will be needed later when configuring authentik. -
In the leftmost sidebar, navigate to Certificates & secrets.
-
Select the Client secrets tab and click New Secret. Configure the following required settings:
- Description: provide a description for the secret (e.g.
authentik secret). - Expires: choose an expiration period. As authentik does not yet support automatic secret rotation, either manual rotation or API-based updates are required. As a result, a duration of at least 12 months is recommended.
- Description: provide a description for the secret (e.g.
-
Copy the secret's value from the Value column.
The secret value is only displayed once at the time of creation. Make sure to copy and store it securely, as it cannot be retrieved later.
- In the sidebar, navigate to API Permissions, then click Add a permission and select Microsoft Graph as the API.
- Select Delegated permissions as the permission type and assign the following permissions:
- Under OpenID Permissions: select
email,profile, andopenid. - Under User: select
User.Read. - Under Group Member (optional): if you need authentik to sync group membership information from Entra ID, select the
GroupMember.Read.Allpermission.
- Under OpenID Permissions: select
- Click Add permissions.
- Under Configured permissions, click Grant admin consent for default directory.
authentik configuration
To support the integration of Entra ID with authentik, you need to create an Entra ID OAuth source in authentik.
Create Entra ID OAuth source
-
Log in to authentik as an administrator and open the authentik Admin interface.
-
Navigate to Directory > Federation and Social login, click Create, and then configure the following settings:
- Select type: select Entra ID OAuth Source as the source type.
- Create Entra ID OAuth Source: provide a name, a slug which must match the slug used in the Entra ID
Redirect URI, and the following required configurations:- Under Protocol Settings:
- Consumer key:
Application (client) IDfrom Entra ID. - Consumer secret: value of the secret created in Entra ID.
- Scopes (optional): if you need authentik to sync group membership information from Entra ID, add the
https://graph.microsoft.com/GroupMember.Read.Allscope.
- Consumer key:
- Under URL Settings:
- For Single tenant Entra ID applications:
- Authorization URL:
https://login.microsoftonline.com/<directory_(tenant)_id>/oauth2/v2.0/authorize - Access token URL:
https://login.microsoftonline.com/<directory_(tenant)_id>/oauth2/v2.0/token - Profile URL:
https://graph.microsoft.com/v1.0/me - OIDC JWKS URL:
https://login.microsoftonline.com/<directory_(tenant)_id>/discovery/v2.0/keys
- Authorization URL:
- For Multi tenant Entra ID applications:
- Authorization URL:
https://login.microsoftonline.com/common/oauth2/v2.0/authorize - Access token URL:
https://login.microsoftonline.com/common/oauth2/v2.0/token - Profile URL:
https://graph.microsoft.com/v1.0/me - OIDC JWKS URL:
https://login.microsoftonline.com/common/discovery/v2.0/keys
- Authorization URL:
- For Single tenant Entra ID applications:
- Under Protocol Settings:
-
Click Save.
When group membership information is synced from Entra ID, authentik creates all groups that a user is a member of. This sync process is carried out upon each user login, which can cause login delays for organizations with large numbers of groups.
For organizations with larger numbers of users and groups, we recommend using the Entra ID SCIM integration to provision users and groups. These users are then automatically linked to matching users logging in via this Entra ID OAuth source.
For instructions on how to display the new source on the authentik login page, refer to the Add sources to default login page documentation.
For instructions on embedding the new source within a flow, such as an authorization flow, refer to the Source Stage documentation.
Machine-to-machine authentication authentik: 2024.12.0+
If using Machine-to-Machine authentication, some specific steps need to be considered.
When getting the JWT token from Entra ID, set the scope to the Application ID URI, and not the Graph URL; otherwise the JWT will be in an invalid format.
POST /<entra_tenant_id>/oauth2/v2.0/token/ HTTP/1.1
Host: login.microsoftonline.com
Content-Type: application/x-www-form-urlencoded
grant_type=client_credentials&
client_id=<application_client_id>&
scope=api://<application_client_id>/.default&
client_secret=<application_client_secret>
The JWT returned from the request above can be used in authentik and exchanged for an authentik JWT.
Source property mappings
Source property mappings allow you to modify or gather extra information from sources. See the overview for more information.