Identity Enterprise SSO integration with Microsoft Entra ID

Register a Microsoft Entra ID client application for use in Identity Enterprise SSO.

Prerequisites

To be able to manage applications, you must have an Azure account with one of these roles: Application administrator, Application developer, or Cloud application administrator. For more information, see Entra built-in roles.

Register a new application in Microsoft Entra ID

  1. Sign in to the Azure portal.
  2. Search for and select App registrations.
  3. Click New registration and in the Name field, enter the name (to be displayed on Azure) for the application. For example "commercetools Identity".
  4. In the Redirect URI section, select Web as the platform and provide the Redirect URI of Identity as displayed in the SSO configuration form. The value is dependent on the PKCE option. By default it's https://auth.identity.commercetools.com/self-service/methods/oidc/callback as we force the use of PKCE. If you select another PKCE option (auto or disable) the Redirect URI changes.
  5. Click Register.
  6. Copy the Application (client) ID displayed in the Essentials section on the Overview page.
  7. In the Certificates and secrets > Client secrets section.
    1. Click New client secret.
    2. Enter a description for your client secret.
    3. Select an expiration for the secret or specify a custom lifetime.
    4. Click Add.
  8. Copy the client secret Value.
  9. The issuer URL to be assigned in Identity SSO configuration is in the format: https://login.microsoftonline.com/{tenantId}/v2.0. See Endpoints tab > OpenID Connect metadata document (without the /.well-known/openid-configuration part).

Next steps

After registering your client application, continue with the Identity Enterprise SSO initial setup.

Other resources