Option | Setting |
---|---|
Supported account types | To enable SCIM-based user provisioning from this directory, select Accounts in this organizational directory only (Single tenant). To allow users from external organizations (like other Azure AD directories) choose the appropriate multitenant option. Multitenant options include the following: Accounts in any organizational directory (Any Azure AD directory - Multitenant). |
Redirect URI | Select a Redirect URI type of Web, and enter your callback URL: https://{yourDomain}/login/callback . |
auth0.com
, separated by the dot (.
) symbol.
For example, if your tenant name is exampleco-enterprises
, and your tenant is in the US region, your Auth0 domain name would be exampleco-enterprises.us.auth0.com
and your Redirect URI would be https://exampleco-enterprises.us.auth0.com/login/callback
.
However, if your tenant is in the US region and was created before June 2020, then your Auth0 domain name would be exampleco-enterprises.auth0.com
and your Redirect URI would be https://exampleco-enterprises.auth0.com/login/callback
.
If you are using custom domains, your Redirect URI would be https://<YOUR CUSTOM DOMAIN>/login/callback
.
During this process, Microsoft generates an Application (client) ID for your application; you can find this on the app’s Overview screen. Make note of this value.
Delegated Permissions | Description |
---|---|
Users > User.Read | So your app can sign in users and read the signed-in users’ profiles. |
Directory > Directory.Read.All | So your app can read directory data on the signed-in user’s behalf. |
+
.
Field | Description |
---|---|
Connection name | Logical identifier for your connection; it must be unique for your tenant. Once set, this name can’t be changed. |
Microsoft Azure AD Domain | Your Azure AD domain name. You can find this on your Azure AD directory’s overview page in the Microsoft Azure portal. |
Client ID | Unique identifier for your registered Azure AD application. Enter the saved value of the Application (client) ID for the app you just registered in Azure AD. |
Client Secret | String used to gain access to your registered Azure AD application. Enter the saved value of the Client secret for the app you just registered in Azure AD. |
User ID Attribute Type | Attribute in the ID token that will be mapped to the user_id property in Auth0. The options correspond to the two supported ID types described in Microsoft’s documentation: ID token claims reference - Microsoft identity platform. |
Use common endpoint | (Optional) When enabled, your application will dynamically accept users from new directories. Typically enabled if you selected a multi-tenant option for supported account types for the application you just registered in Azure AD. Auth0 redirects users to Azure’s common login endpoint and Azure performs Home Realm Discovery based on the domain of the user’s email address. |
Identity API | API used by Auth0 to interact with Azure AD endpoints. Learn about the differences in behavior in Microsoft’s Why update to Microsoft identity platform (v2.0) doc. |
Attributes | Basic attributes for the signed-in user that your app can access. Indicates how much information you want stored in the Auth0 User Profile. |
Extended Attributes (optional) | Extended attributes for the signed-in user that your app can access. |
Auth0 APIs (optional) | When selected, indicates that we require the ability to make calls to the Azure AD API, which allows us to search for users in the Azure AD Graph even if they never logged in to Auth0. |
Email Verification | Choose how Auth0 sets the email_verified field in the user profile. To learn more, see Email Verification for Azure AD and ADFS. |
Field | Description |
---|---|
Sync user profile attributes at each login | When enabled, Auth0 automatically syncs user profile data with each user login, thereby ensuring that changes made in the connection source are automatically updated in Auth0. |
Sync user profiles using SCIM | When enabled, Auth0 allows user profile data to be synced using SCIM. For more information, see Configure Inbound SCIM. |
Field | Description |
---|---|
Home Realm Discovery | Compares a user’s email domain with the provided identity provider domains. For more information, read Configure Identifier First Authentication |
Display connection button | This option displays the following choices to customize your application’s connection button. |
Button display name (Optional) | Text used to customize the login button for Universal Login. When set the button reads: “Continue with {Button display name}”. |
Button logo URL (Optional) | URL of image used to customize the login button for Universal Login. When set, the Universal Login login button displays the image as a 20px by 20px square. |