MS Azure AD OIDC
The following procedure creates an OIDC SSO configuration for your Enterprise organization.
Prerequisites
Owner
oradmin
role in an Enterprise organizationAdministrative access to your organization's Microsoft Azure AD portal
Supported features
This configuration supports the following:
Service provider initiated SSO
Single Log Out [optional]
Configuration steps
Before configuring SSO, you need to assign a namespace and make files of your service provider certificate and private key. These steps provide the information you need to enter later.
Create your namespace:
Go to Organization > SSO.
Under Namespace, enter the namespace you want for your organization, for example,
acmecorp
. Your organization members enter this namespace when they log in via SSO.Under SSO type, select Oauth2.
Steps on Microsoft Azure AD
Create an OIDC application on Microsoft Azure AD
Log in to Microsoft Azure AD and go to Manage Microsoft Entra ID.
Click Enterprise applications.
Click + New Application.
Click + Create your own application.
Enter a name for your app and select Register an application to integrate with Microsoft Entra ID (App you're developing).
Click Create.
Enter and select the following:
Section on Register an application page
Required information
Name
Enter a name for your OIDC SSO app
Supported account types
Select the option best for your use case.
For example, use Accounts in this organizational directory only if your application is only for internal use within your organization.
Redirect URI (optional)
Although Microsoft marks this field as optional, successful implementation with Make requires the following:
Select a platform - Web
https://next.integromat.com/sso/login
Click Register.
Create your client credentials
In the Microsoft Azure AD portal go to Home > Enterprise applications > {your OIDC app} > Single Sign-on and click Go to application.
Under Essentials, find Application (client) ID. Copy this value and save it in a secure place. This is the required information for the Client ID field in your Make SSO configuration.
In the lefthand menu under Manage, click Certificates & secrets.
Click + New client secret.
In the new dialogue, enter a short description and click Add.
Find the new client secret on the list. Copy the Value and save it in a secure place. This is the required information for the Client secret field in your Make SSO configuration.
Configure tokens and optional claims
In the lefthand menu under Manage, click Token Configuration.
Click + optional claim.
In the new dialogue, select ID.
A list appears. Select Email.
Add API permissions
In the lefthand menu under Manage, click API Permissions.
Click + Add permission.
In the new dialogue, click Microsoft Graph.
Click Application permissions.
Use the search bar to find
User.Read.All
.Select
User.Read.All
and click Add permissions.Tip
You can select
User.Read
instead ofUser.Read.All
Add users to your application
To provide access to your organization members, you need to add these users to your app in the MS Azure portal.
In the Microsoft Azure AD portal go to Home > Enterprise applications > {your OIDC app}.
Click Users and groups.
Click + Add user/group to add the users you want to access your Make organization.
Steps in Make
Enter the following information on the SSO tab of your organization's dashboard:
Field on SSO tab
Value to enter
User information URL
https://graph.microsoft.com/v1.0/me
Client ID
Enter the Application (client) ID you copied in step 2 of Create your client credentials.
Token URL
https://login.microsoftonline.com/1234etc/oauth2/v2.0/token
Login scopes
User.Read.All
Scopes separator
Enter a single space.
Authorize URL
To find your Authorize URL:
In the Microsoft Azure AD portal go to Home > Enterprise applications > {your OIDC app} > Single Sign-on and click Go to application.
Click Endpoints. A window appears.
Find OAuth 2.0 authorization endpoint (v1). Copy and paste this URL into your Make configuration.
Client secret
Enter the Value you copied in step 6 of Create your client credentials.
User information IML resolve
{"id":"{{id}}","email":"{{mail}}","name":"{{givenName}}"}
Redirect URL
No action required
Team provisioning for new users
Select an option based on your needs.
Click Save.
Service provider initiated SSO
Go to Make's login page.
Click Sign in with SSO.
Enter the namespace you chose for your organization.
Log in using your Microsoft credentials and consent to Make's access to your user data.
Troubleshooting
When you save the SSO configuration, you automatically receive an email with a link to bypass SSO login. Use this link to log in and adjust your configuration as needed.