Microsoft Entra ID External Authentication Methods
Microsoft Entra ID is a customer identity and access management (CIAM) solution for managing external identities. See the following documentation for more help:
- https://learn.microsoft.com/en-us/entra/external-id/
- https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-external-method-manage
- https://learn.microsoft.com/en-us/entra/identity/authentication/concept-authentication-external-method-provider.
You can configure Microsoft Entra ID External Authentication Methods to use Identity as a Service for multi-factor authentication. To do this, you must add Microsoft Entra ID External Authentication Methods as an application in Identity as a Service. This integration guide describes how to integrate Microsoft Entra ID External Authentication Methods with Identity as a Service. To integrate Microsoft Entra ID Active Directory with Identity as a Service, see Integrate Microsoft Entra ID active directory with Identity as a Service.
You can configure one or more Microsoft Entra ID External Authentication Methods OIDC applications for your Microsoft Entra ID tenant that can be used across all applications within that tenant. For example, you can create multiple Microsoft Entra ID External Authentication Methods OIDC applications in Identity as a Service and set each application to require a different authenticator.
To integrate Microsoft Entra ID External Authentication Methods with Identity as a Service, complete the following steps:
Step 1: Complete the following prerequisites:
- Synchronize your Microsoft Entra ID users with Identity as a Service. See Synchronize Microsoft Entra ID External users with Identity as a Service and Sync an on-premises AD with Microsoft Entra ID External.
- If you have not done so already, Create a gateway.
- Obtain the Microsoft Entra ID Tenant ID
- Log in to the Microsoft Entra ID portal.
- In the Navigation pane, click Microsoft Entra ID. The Directory Overview page appears.
- In the Manage section, click Properties.
- Copy the Directory ID. The Tenant ID and the Directory ID are the same.
Step 2: Add Microsoft Entra ID External Authentication Methods to Identity as a Service
-
Log in to an Identity as a Service account with a role that allows you to configure applications.
-
Click > Security > Applications. The Applications List page appears.
-
Click Add. The Select an Application Template page appears.
-
Do one of the following:
- Select OpenID Connect and OAuth Cloud Integrations from the search drop-down list and scroll to find the application you want to add to IDaaS.
- In the Search bar, enter a search option to filter for the application you want to add to IDaaS.
-
Click Microsoft Entra ID External Authentication Methods (formerly Azure AD). The Add Microsoft Entra ID External Authentication Methods page appears.
-
In the App Settings, Modify the Application Name and Application Description, if required.
-
In the OIDC Settings, do the following:
-
Optional. Set the Reauthentication Time to require users to reauthenticate after a predetermined amount of time.
-
Select the OIDC Signing Certificate.
noteThe Login Redirect URI and the Supported Scopes are selected by default.
-
From the User ID Mapping Attribute drop-down list, select User Principal Name to map the Microsoft Entra ID incoming claim to the attribute used to find the user.
-
Select Require Consent if you want the user to be prompted for consent for each request.
-
Optional. Enter a Consent Message to include a message to users when consent is requested.
-
-
In the Microsoft Entra ID External Authentication Methods Settings, do the following:
-
Select the Incoming Userid Claim from the drop-down list. The default is User Principal Name. This value is the incoming claim used by Microsoft Entra ID Directory to identify the user.
noteAn Identity as a Service account that is synchronized with a corporate directory containing User Principal Name values, auto-populates the User Principal Name in the user profile information when directory synchronization occurs. This value is stored in the user’s User Principal Name system attribute. See Trigger on-demand synchronization to trigger an immediate directory synchronization.
If the User Principal Name is not populated by directory synchronization, you must populate the user’s User Principal Name system attribute manually for every user integrated with Microsoft Entra ID External Authentication Methods.
-
In the Customer Tenant/Directory ID text box, enter the Microsoft Entra ID tenant ID, for example,
a5a69e76-58be-4303-9339-9fe8f582523d.
-
-
Open a text editor such as Notepad and copy and save the following contents from the JSON file under Microsoft Entra ID External Authentication Methods JSON Text:
appIDclientIddiscoveryUrl
You need this information for Step 4: Configure the Microsoft Entra ID Tenant.
-
Click Show Advanced Settings to configure advanced settings.
-
Select Enable Organizations to allow organization information to be returned in OIDC claim values when users log in. When enabled, if users are associated with more than one organization and an organization has not been requested, users can select their organizations after they authenticate to their application.
noteWhen organizations are enabled, the corresponding OIDC claims must also be configured.
-
From the ID Token Signing Algorithm drop-down list, select the signing algorithm that is used to sign the ID tokens during authentication.
-
Set the ID Token Timeout to the time (in minutes) that the ID token is valid before it expires.
-
Click Save.
Step 3: Add a resource rule
Set Skip Password as the first-factor authentication type and then set the second-factor authenticators that you want to use with Microsoft Entra ID.
Step 4: Configure the Microsoft Entra ID Tenant
- Ensure that you have synchronized your Microsoft Entra ID users with Identity as a Service. See Synchronize Microsoft Entra ID External users with Identity as a Service and Sync an on-premises AD with Microsoft Entra ID External and Sync an on-premises AD with Microsoft Entra ID External.
- Log in to the Customer Tenant as an administrator. The Home page appears.
- Go to Home > Protection > Authentication Policies > Add external method (Preview).
- Enter the Name for the external authentication method.
- In the Client ID field, enter the
clientIdyou copied from the JSON file in Step 2: Add Microsoft Entra ID External Authentication Methods to Identity as a Service. - In the Discovery Endpoint field, enter the
discoveryUrlyou copied from the JSON file in Step 2: Add Microsoft Entra ID External Authentication Methods to Identity as a Service. - Enter the App ID field, enter the
appIdyou copied from the JSON file in Step 2: Add Microsoft Entra ID External Authentication Methods to Identity as a Service. - Click Request permission.
- You are prompted for Permission for the app to access Microsoft Entra ID.
- Click Accept.
- Toggle Enable and Target to Enable.
- Select the target resource from the Add Target drop-down list.
- Click Save.
Step 5: Add conditional policies to Microsoft Entra ID
- Log in to the Customer Tenant as an administrator. The Home page appears.
- Go to Conditional Access > Policies > Add New policy. The Add New Policy page appears.
- To apply the policy users or user groups, from the Users list, select the applicable users or user groups.
- To apply the policy to specific applications, from the Target resource list, select the specific applicable applications, or select All cloud apps to have the policy apply in every case.
- Under Grant, select the Grant access option and enable the Require multifactor authentication checkbox.
- Next to Enable policy, select On.
- Click Save.
Step 6: Test the Entra ID External Authentication Methods
- Go to the Microsoft Entra ID portal.
- Log into Microsoft Entra ID with a user that you selected as part of the policy definition for conditional access.
- Enter the password. You are redirected to Identity as a Service for second-factor authentication.
- Respond to the second-factor challenge.
- Confirm that the user has logged in to the Microsoft Entra ID portal successfully.