Connect to Microsoft Entra ID

When connecting Microsoft Entra ID as an external identity provider to 10Duke Enterprise for user authentication, configure 10Duke Enterprise as a client in Microsoft Entra ID.

The steps below guide you how to define an OpenID Connect (OIDC) client connection for 10Duke Enterprise. For more detailed instructions, see Microsoft Entra ID’s documentation for registering applications.

Note: During the process, make sure to copy and store (temporarily) details from the Azure portal as instructed below.

You need the details later when you define the connection to Microsoft Entra ID at the 10Duke Enterprise end using SysAdmin.

If your client application authenticates users directly with Microsoft Entra ID, it’s not necessary to configure 10Duke Enterprise as a client in Microsoft Entra ID. However:

  • When you define the connection to Microsoft Entra ID in SysAdmin, you need either the public key in Privacy Enhanced Mail (PEM) format or the jwks_uri value in the identity provider’s OIDC Discovery document. Both of these are typically available in the identity provider’s user interface.

  • By default, 10Duke Enterprise requires that when Microsoft Entra ID provides your client application with an ID token, it contains an aud value that matches the base URL of your 10Duke Enterprise deployment. This may require some configuration in Microsoft Entra ID. If needed, contact the 10Duke Integration Support team.

Before you start

By default, 10Duke Enterprise requires that the external identity provider returns at least the ID, email address, first name, and last name of the authenticated user. If this is not possible, a configuration change in 10Duke Enterprise is required. Contact the 10Duke Integration Support team.

Step 1: Register 10Duke Enterprise as a client application

In the Azure portal, first register 10Duke Enterprise as a client application in Microsoft Entra ID:

  1. Go to app registrations and start creating a new registration.

  2. Enter basic information on your 10Duke Enterprise deployment:

    • Define a name for the 10Duke Enterprise client application.

    • In supported account types, select the one that suits your purposes. The most common use case is to use “accounts in this organizational directory only”.

    • In the OIDC redirect URI, select Web as the endpoint type and enter https://<your 10Duke Enterprise instance>/user/oauth20/cb as the endpoint.

  3. Register the client application.

  4. After registering, copy the following details:

    • On the page that opened after registering, copy the application (client) ID shown there (for Client key in SysAdmin).

    • Go to the endpoints settings, and copy the endpoints created for the client application:

      • OAuth 2.0 authorization endpoint (v2) (for Authorization token URL in SysAdmin)

      • OAuth 2.0 token endpoint (v2) (for Access token URL in SysAdmin)

  5. Go to the authentication settings, and in the front-channel logout URL (optional), enter https://<your 10Duke Enterprise instance>/user/oidc/idp-logout.

Step 2: Create a client secret

  1. Go to the certificates and secrets settings of the client application.

  2. Add a new client secret:

    • Write a description for the client secret.

    • Select when you want the client secret to expire. Note that when the client secret expires, you need to add a new one here and update it to the connection details in SysAdmin.

Important: After adding the secret, copy the secret’s value shown on the page (for Client secret in SysAdmin).

Copy it now: it won’t be available later.

Step 3: Add API permissions for OIDC scopes

Next, add the API permission that defines the OIDC scopes that 10Duke Enterprise is allowed to use to request user information from Microsoft Entra ID.

  1. Go to the API permission settings of the client application.

  2. Add a new API permission. Select first the Microsoft Graph option and then the delegated permissions.

  3. Select email, openid, and profile and add the permissions.

    Take note of the scopes for later (for OAuth - OpenId Connect Scopes in SysAdmin).

  4. After adding the permissions, grant admin consent. These permissions must be accepted and granted by the account admin before you can proceed with this configuration.

Now the 10Duke Enterprise client application is ready in Microsoft Entra ID.

Next steps

Define the connection to Microsoft Entra ID in 10Duke SysAdmin.

If you’re having trouble with connecting, try allowing public client flows in the advanced settings of the 10Duke Enterprise client application in Microsoft Entra ID.