Overview
This guide walks you through configuring Microsoft Azure Active Directory (now called Microsoft Entra ID) as your SSO identity provider. Perfect for Microsoft 365 and Office 365 organizations.
- Azure AD admin access (Global Administrator or Application Administrator role)
- Scalelite Manager Pro subscription (Pro or Enterprise tier)
- Your callback URL from the SSO Settings page
1Access Azure Portal
Go to portal.azure.com and sign in with your Azure AD admin account.
Navigate to Azure Active Directory → App registrations → New registration.
2Register New Application
Fill in the application details:
The user-facing display name for this application
⚠️ Copy this exact URL from your SSO Settings page
3Copy Application (Client) ID
After registration, you'll see the application overview. Copy the Application (client) ID:
a1b2c3d4-e5f6-7890-abcd-ef1234567890
12345678-90ab-cdef-1234-567890abcdef
4Create Client Secret
Navigate to Certificates & secrets and create a new client secret:
Client secrets
AbC~dEfGhIjKlMnOpQrStUvWxYz.1234567890
5Configure in Scalelite Manager
Return to your SSO Settings page and click "Add Provider".
- Select "Azure AD" as the provider type
- Enter a name (e.g., "Company Microsoft SSO")
- Paste your Application (client) ID
- Paste your Client Secret value
- Optionally, restrict to specific email domains
- Click "Save Provider"
6Enable and Test
After saving, click "Enable" and test the SSO login by signing in with a Microsoft account from your organization.
Next Steps
- Return to SSO Settings
- Configure user assignment (optional - by default all users can sign in)
- Set up Conditional Access policies in Azure AD for additional security