- 11 Feb 2025
- 5 Minutes to read
- Print
- DarkLight
- PDF
Microsoft Entra ID Identity Provider Integration
- Updated on 11 Feb 2025
- 5 Minutes to read
- Print
- DarkLight
- PDF
You can integrate your Microsoft Entra ID Identity Provider (IdP) with Axiad Mesh to ensure that your users are securely logging into the portal.
The integration requires updates on both Entra ID and Axiad Mesh.
Entra ID Configuration Steps
IMPORTANT
These steps are Axiad’s current understanding of the configuration. Since Entra ID is a third-party product, there may be slight variations between your experience and what the guide describes. We work hard to keep things as up to date as possible, but depending on versions in use, latest updates, etc., there may be some mismatches.
If you find any blatant differences or anything that does not make sense, then please provide feedback on this article.
Note
The Entra ID steps are similar for both integrations as an IdP and as a Connector with Axiad Mesh; however, it is important that each integration type has its own enterprise application in Entra ID to ensure that the permissions are assigned accordingly.
Create New Enterprise Application
Log into the Microsoft Entra admin center as at least a Cloud Application Administrator
Navigate to Identity > Enterprise applications
Click New application
On the Browse Microsoft Entra Gallery page, click Create your own application
In the Create your own application modal, set the name to a friendly name
Select Register an application to integrate with Microsoft Entra ID (App you’re developing)
Click Create
On the Register an application page, set the Name to the friendly name
Select Accounts in this organizational directory only (Eagle 101 only - Single tenant)
Axiad Recommendation
We recommend that you create and test the integration with Axiad Mesh using a single tenant. Upon success, you can then change this setting to a multitenant environment as needed
Click Register
Configure Application Properties
In the Entra admin console, navigate to Identity > Enterprise applications > All applications
Locate and open your newly created application
Under Manage in the menu, select Properties
Select Yes for Enabled for users to sign-in?
Select Yes for Assignment required?
Select No for Visible to users?
Click Save
Copy the Application ID, as it will be required in the Axiad Configuration Steps
Configure Application Owners
In the Entra admin portal, navigate to Identity > Applications > Enterprise applications > All applications
Locate and open your newly created application
Under Manage in the menu, select Owners
In the Owners modal, search for and add desired application owners
Once they are all added, click Save
Assign Users and Groups
In the Entra admin portal, navigate to Identity > Applications > Enterprise applications > All applications
Locate and open your newly created application
Under Manage in the menu, select Users and groups
Search for and select the desired application users and / or groups allowed to use Axiad Mesh
Once the users / groups are added, click Save
Generate Client Secret
In the Entra admin portal, navigate to Identity > Applications > Enterprise applications > All applications
Locate and open your newly created application
Under Manage in the menu, select Single sign-on
On the OIDC-based Sign-on page, click Go to application in the Configure application properties section
Under Manage in the menu, select Certificates & secrets
Click New client secret
On the Add a client secret page, provide a Description, set the Expires to the expiration time, and then click Add
Once the secret is created, copy the Value from the Certificates & secrets page
IMPORTANT
You can only copy this value immediately after creating it and it is required for the Axiad Configuration Steps. Be sure to copy this value now because you will not have another opportunity, and you will need to create a new client secret instead.
Axiad Mesh Configuration Steps
Note
You can integrate your Entra ID IdP with Axiad in the initial onboarding process as the primary IdP; or as a secondary IdP after you configured another IdP as the primary IdP.
For more information about the initial onboarding process, please review the Axiad Mesh Admin Onboarding Guide.
Initial Onboarding Configuration
If you are adding Entra ID as your primary IdP during your initial onboarding, then complete the following steps.
After clicking on the access link from the Axiad Mesh welcome email, you will be prompted to set up your primary IdP
Set the Domain to the domain of your Entra ID environment
Select Microsoft Entra ID from the Provider dropdown
Set the Microsoft Entra Tenant ID to the Tenant ID of your Entra ID environment
Fill in the fields with the values copied from the Entra ID Configuration Steps:
Set the Application (client) ID to the Application ID value copied in the Configure Application Properties section, step 8 above
Set the Client secret value to the Value copied in the Generate Client Secret section, step 8 above
On the next screen, set the Admin groups based on which users you would like to be Axiad Mesh admins when logging in with Entra ID
Entra ID Group Limitations
Only users that are in the groups included in the Assign Users and Group section above can access Axiad Mesh, so for any groups you add here, be sure that they are members of any group limitations made in Entra ID.
Click Continue and then you’ll be logged into the Axiad Mesh portal for the first time
Secondary IdP Configuration
If you already have your initial IdP connected and need to add a new one or you need to replace the existing one, then you can connect your Entra ID IdP from the Axiad Mesh administrative portal.
From the homepage, click on the gear icon to get to the Settings page
Select Identity providers from the left-hand menu and click + Add identity provider
On the Add identity provider page, set the Domain to the domain of your Entra ID environment
Select Microsoft Entra ID from the Provider dropdown
Set the Microsoft Entra Tenant ID to the Tenant ID of your Entra ID environment
Fill in the fields with the values copied from the Entra ID Configuration Steps:
Set the Application (client) ID to the Application ID value copied in the Configure Application Properties section, step 8 above
Set the Client secret value to the Value copied in the Configure OIDC-based Sign-on section, step 8 above
Set the Admin groups based on which users you would like to be Axiad Mesh admins when logging in with Entra ID
Entra ID Group Limitations
Only users that are in the groups included in the Assign Users and Group section above can access Axiad Mesh, so for any groups you add here, be sure that they are members of any group limitations made in Entra ID.
Once the fields are filled out, click Test Connection
Upon a successful test, click Add & Connect
Once completed, you’ll see the new IdP listed on the Identity providers page