Microsoft Entra SSO
Info
See Microsoft Identity Platform for more details.
This guide walks you through configuring Microsoft Entra ID as the authentication provider for your organisation in Canary.
You’ll need:
- A Microsoft Entra tenant
- An OAuth 2.0 Client ID
- A Client Secret
1. Create an Enterprise Application in Entra
- Login to your Entra tenant
- Click on Manage > Enterprise Applications in the left menu.
- Click on New Application in the top menu bar and then Create your own application.
- Give your app a name like “Canary App” and select Register an application to integrate with Microsoft Entra ID (App you’re developing). This app and name is solely in your tenant. Click the Create button.
- Give your app registration a name (this can be anything) and we recommend you select the option Accounts in this organizational directory only. This limits usage to only users in your own tenant.
- Select Web as the platform type and enter the following redirect URI
https://canary.kaweka.nz/auth/callbackis the main URI for normal logins
- Click the Register button
2. Configure the App Registration
- Go to App registrations and select the app you have just created.
- Under Authentication enter the following two Redirect URIs,
https://canary.kaweka.nz/auth/callbackis the main URI for normal loginshttps://canary.kaweka.nz/auth/callback/testallows a test redirect when setting things up- Press the Save button
- Check the API permission menu item to confirm the app has User.Read permissions only. This will allow the Canary app to view the basic information about the logged in user. i.e. name, email address and a profile icon.
- As an admin role user click the Grant admin consent button to allow the app to use those permissions.
- In the Certificates & secrets section add a secret and copy the client secret value. This is what we need to configure the Canary organisation config.
- Under Branding & properties add the following,
- Name =
Canary - Logo =
https://canary.kaweka.nz/src/assets/canary.png - Home page URL =
https://canary.kaweka.nz
- Name =
3. (Optional) Restrict Login to a Group of Users
In the Enterprise Applications section in Entra do the following,
- Open the correct application details
- Under Users and groups add the specific people or Entra ID/AD groups to allow them to use the app.
- Go to the Properties menu item and set the following,
- Enabled for users to signin? to Yes
- Assignment required? to Yes
4. Configure SSO in Canary Monitoring
Inside the Canary admin interface:
- Navigate to: Settings → Organistion → Single Sign On
- Select Microsoft Entra as the Identity Provider.
- Paste in:
- Client ID - get this from the application registration page in Entra ID
- Client Secret - you should store this securely
- Entra tenant ID - get this from the application registration page in Entra ID
- Click the Save SSO button to save your changes
6. Test Your Configuration
Before enforcing SSO for all users, perform a test:
- Click Test SSO in the Single Sign On admin panel.
- Authenticate using your Entra account.
- Confirm Canary successfully logs you in
If everything checks out, you can safely enable your SSO config and enforce it for all your organisation users.
7. Troubleshooting
User ID does not match that submitted
The SSO auth process requires the email attribute of the Entra user to match that used for the Canary user. Make sure the Entra email attribute is set properly for your users.
Redirect URI Mismatch
Check that your redirect URI in the Entra Application registration exactly matches the URIs in Canary.
Invalid Client ID or Secret
Make sure you copied the correct values and didn’t include whitespace.
Support
If you are still experiencing issues please contact us at support@kaweka.nz