# Microsoft Entra ID (formerly Azure AD)

## Introduction[​](https://app.dev.paradime.io/_help/92e9662/sso-azure-ad#introduction) <a href="#introduction" id="introduction"></a>

Microsoft Entra ID (formerly Azure AD) provides secure identity management and single sign-on to applications that you can add to your Azure Active Directory. From Azure AD, you can provision users who should have access to Paradime i.e. any user added to your Microsoft Entra application, will be able to register / login to Paradime.

## Creating an application[​](https://app.dev.paradime.io/_help/92e9662/sso-azure-ad#creating-an-application) <a href="#creating-an-application" id="creating-an-application"></a>

Log into the [Azure portal](https://portal.azure.com/#home) and select Azure Active Directory page, choose the relevant directory where you want to register the new application.

1. On the left panel under **Manage**, select **App registrations**
2. On the top of your screen click on the **+ New registration** button

<div data-with-frame="true"><figure><img src="https://2337193041-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHET0AD04uHMgdeLAjptq%2Fuploads%2FJCkBdZxKam7lXS0D2OBc%2Fazure_ad_register_app.png?alt=media&#x26;token=b8637612-c2c4-4fd2-9aea-ee883917820d" alt=""><figcaption><p><em>Azure AD register app</em></p></figcaption></figure></div>

3. In the in the **Name** field enter `Paradime`
4. In the **Supported account types** select `Accounts in this organizational directory only (single tenant)`
5. From the dropdown, select the `Web` option, enter the **Redirect URI** based on your region and click on the `Register` button.

<table><thead><tr><th width="209.93359375">Region</th><th>Redirect URI</th></tr></thead><tbody><tr><td>EU 🇪🇺</td><td> <code>https://account.paradime.io/login/callback</code></td></tr><tr><td>US 🇺🇸</td><td><code>https://account.us.paradime.io/login/callback</code> </td></tr></tbody></table>

<div data-with-frame="true"><figure><img src="https://2337193041-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHET0AD04uHMgdeLAjptq%2Fuploads%2FlXJ9FZP1yMScRKsXEEDI%2Fazure_ad_add_app_details.png?alt=media&#x26;token=e0d806f9-ebe9-4158-8022-85e4b6e321bc" alt=""><figcaption><p><em>Azure AD register app</em></p></figcaption></figure></div>

### Configuring permissions[​](https://app.dev.paradime.io/_help/92e9662/sso-azure-ad#configuring-permissions) <a href="#configuring-permissions" id="configuring-permissions"></a>

6. On the left panel under **Manage**, select **API permissions**
7. Click on **+ Add permissions**

<div data-with-frame="true"><figure><img src="https://2337193041-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHET0AD04uHMgdeLAjptq%2Fuploads%2Fvf23aHVEmZwI7iWTcBKs%2Fazure_ad_api_permissions.png?alt=media&#x26;token=09ef5af7-4506-4904-b7b2-ceae8e6a3142" alt=""><figcaption><p><em>Azure AD API permissions</em></p></figcaption></figure></div>

8. Choose **Microsoft Graph** and select **Delegated permissions**
9. Select the permission as per the table below and click **Add permission**

| **API Name**    | **Type**  | **Permission**               |
| --------------- | --------- | ---------------------------- |
| Microsoft Graph | Delegated | `User.Read`                  |
| Microsoft Graph | Delegated | `Directory.Read.All`         |
| Microsoft Graph | Delegated | `Directory.AccessAsUser.All` |

<div data-with-frame="true"><figure><img src="https://2337193041-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHET0AD04uHMgdeLAjptq%2Fuploads%2FUppSI8978NQN0zLRAhnU%2Fazure_ad_add_api_permissions.png?alt=media&#x26;token=76e446ff-fd00-4207-8f87-faf8a8bbeed6" alt=""><figcaption><p><em>Azure AD API permissions</em></p></figcaption></figure></div>

10. Now click on **Grant admin consent** to complete configuring the permissions required. You should see the `Status column` with a ✅ for the 3 permissions just granted

<div data-with-frame="true"><figure><img src="https://2337193041-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHET0AD04uHMgdeLAjptq%2Fuploads%2FK9luYWw4uNEdX5iJvOKS%2Fazure_ad_grant_permissions.png?alt=media&#x26;token=f0935c1a-5f0d-4cfd-91fb-b4229bed037a" alt=""><figcaption><p>Azure AD grant permissions</p></figcaption></figure></div>

### Adding Users to an Enterprise Application[​](https://app.dev.paradime.io/_help/92e9662/sso-azure-ad#adding-users-to-an-enterprise-application) <a href="#adding-users-to-an-enterprise-application" id="adding-users-to-an-enterprise-application"></a>

Now that you registered the application and granted the appropriate API permissions, you will want to assign the list of users that you want to enable to register / login to Paradime.

11. Navigate back to the Azure Active Directory where you created the nee application and from the left panel select **Enterprise Applications**
12. From the list, select the application you just created
13. In the left panel now select **Users and groups**
14. Click on **+ Add user/group** and assign from your list the users/group you want to enable to register / login into Paradime

<div data-with-frame="true"><figure><img src="https://2337193041-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHET0AD04uHMgdeLAjptq%2Fuploads%2FgGwByfb3fS9BYZH6km4b%2Fazure_ad_add_users.png?alt=media&#x26;token=8ec4d959-006d-4576-8451-81251e23d4a3" alt=""><figcaption><p><em>Azure AD add users</em></p></figcaption></figure></div>

## Get ClientID, Client Secret and primary domain[​](https://app.dev.paradime.io/_help/92e9662/sso-azure-ad#get-clientid-client-secret-and-primary-domain) <a href="#get-clientid-client-secret-and-primary-domain" id="get-clientid-client-secret-and-primary-domain"></a>

Now that the app is configured with the required API permissions and users have been added to our Paradime enterprise application, we will need generate a Client secret and collect the Client ID and Azure AD primary domain.

### Find the Azure AD primary domain[​](https://app.dev.paradime.io/_help/92e9662/sso-azure-ad#find-the-azure-ad-primary-domain) <a href="#find-the-azure-a-d-primary-domain" id="find-the-azure-a-d-primary-domain"></a>

15. To find the Azure AD domain, navigate to your Azure Directory home screen, you will find the Primary domain in the `Basic information` section

<figure><img src="https://2337193041-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHET0AD04uHMgdeLAjptq%2Fuploads%2FODKbi4m5hiUrlL57F7jl%2Fazure_ad_primary_domain.png?alt=media&#x26;token=e925217a-4c4a-4f9d-88be-c29265ed0876" alt=""><figcaption><p><em>Azure AD primary domain</em></p></figcaption></figure>

### Get your Client ID[​](https://app.dev.paradime.io/_help/92e9662/sso-azure-ad#get-your-client-id) <a href="#get-your-client-id" id="get-your-client-id"></a>

16. To find your Client ID, on the left panel under **Manage**, select **App registrations**
17. Select the Application you created the previous steps and in the `Overview` page copy the **Application (client) ID**

<figure><img src="https://2337193041-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHET0AD04uHMgdeLAjptq%2Fuploads%2FJs00mlsC0e5vGWSzNqjj%2Fazure_ad_client_id.png?alt=media&#x26;token=42d5c120-ff3f-49c7-b7d6-09f3ff449ff8" alt=""><figcaption><p><em>Azure AD Client ID</em></p></figcaption></figure>

### Generate a Client Secret[​](https://app.dev.paradime.io/_help/92e9662/sso-azure-ad#generate-a-client-secret) <a href="#generate-a-client-secret" id="generate-a-client-secret"></a>

18. Under Manage, click Certificates & secrets
19. Click +New client secret

<figure><img src="https://2337193041-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHET0AD04uHMgdeLAjptq%2Fuploads%2Fow6rRn3ZBmZJIZWjLvLG%2Fazure_ad_client_secret.png?alt=media&#x26;token=61a00e2a-6f21-42dd-b342-3e91d22792d3" alt=""><figcaption><p><em>Azure AD Client Secret</em></p></figcaption></figure>

20. Name the client secret "paradime" (or similar) to identify the secret
21. Select 730 days (24 months) as the expiration value for this secret (recommended)

<figure><img src="https://2337193041-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHET0AD04uHMgdeLAjptq%2Fuploads%2FCXtreHgjDgESUH4F2HC4%2Fazure_ad_client_secret_create.png?alt=media&#x26;token=dda1698e-b77d-4b3f-8e6a-9d5d58949217" alt=""><figcaption><p><em>Azure AD Client Secret</em></p></figcaption></figure>

22. Click Add to finish creating the client secret value (not the client secret ID)
23. Record the generated **client secret value** somewhere safe. Later in the setup process, we'll use this client secret in Paradime to finish configuring the integration.

<div data-with-frame="true"><figure><img src="https://2337193041-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHET0AD04uHMgdeLAjptq%2Fuploads%2FkpjUPJvlqlpvwwI0Sp7i%2FScreenshot%202026-01-12%20at%2011.55.06.png?alt=media&#x26;token=1df3e3a1-870c-4279-8453-3e8feaa42d13" alt=""><figcaption></figcaption></figure></div>

## Configuring Paradime to enable Azure AD SSO[​](https://app.dev.paradime.io/_help/92e9662/sso-azure-ad#configuring-paradime-to-enable-azure-ad-sso) <a href="#configuring-paradime-to-enable-azure-a-d-sso" id="configuring-paradime-to-enable-azure-a-d-sso"></a>

Contact the Paradime Support team at <support@paradime.io> and share the following information:

* **Your Microsoft Azure AD Domain**
* **Client ID**
* **Client Secret**

Paradime Support will process your request. After receiving a confirmation email, you can start logging into Paradime and only users in your Azure AD will be login to your account in Paradime using SSO.

{% hint style="success" %}
If you already have an existing Social login setup, then using the Azure AD SSO option, Paradime will automatically link your accounts and you can then use Azure AD SSO for all future logins.&#x20;
{% endhint %}
