Skip to main content
All CollectionsEnterprise SSO
Configure an OIDC based Single Sign On connect with Microsoft Entra ID

Configure an OIDC based Single Sign On connect with Microsoft Entra ID

A step by step guide on how to setup a SSO connection between Microsoft Entra ID and 3D Repo via OIDC

C
Written by Carmen Fan
Updated this week

Register a new application

1. Register an application in your Azure portal

2. Enter a name for your application and add https://auth.3drepo.io/oauth/account/oidc/callback as a Web based redirect URL, and click Register

Token configurations

  1. You will need to grant the app permissions to access the users’ email, given name and family name. Go to Token configuration, click on Add optional claim and select these the following 3 fields:

    A screenshot of a computer

AI-generated content may be incorrect.
  2. A pop up will then appear asking if you would wish to turn on Microsoft Graph permissions, check the box and click Add

    A screenshot of a computer error

AI-generated content may be incorrect.

  3. Finally, go to API permissions and click on Grant admin consent for your organisation:

Your app is now ready.

Information we will need from you

To setup 3D Repo to use this enterprise connection, we will require 4 pieces of information from you:

1. Application ID of the app you have just created

2. Your Entra ID Tenant ID

3. An application Secret

4. Domains of the user you wish to authenticate using this method

Please follow the instructions below to gather this information and send it to your support contact and we will handle the rest.

Getting the IDs

The application ID and tenant ID are shown in the overview page of the application:

Generate an application secret

To connect to your app, 3D Repo will need a Client Secret. Go to `Certificates & secrets` and click on `New client secret`

Please note that 3D Repo will only be able to function if the secret is valid, if the secret expires, you will need to provide a new secret for the integration to work.

The created secret will now display on the list, please ensure you take a note of this secret before you leave this page as Azure portal will not show you the value again.

Did this answer your question?