Kinde supports the use of Microsoft Azure AD (WS Federated and OpenID) as an enterprise-level authentication method.
If you are importing users into Kinde, their Azure ID will be picked up and matched to the relevant connection based on their email address, for a seamless transition to Kinde.
ℹ️ Microsoft Entra ID is about to replace the name Azure AD to refer to Microsoft’s enterprise authentication service. According to Microsoft, nothing about your service will change, but you may see different labelling from October. For now, we will refer to Azure AD in our help topics and interface. This may change at a later date. More information.
- Your app needs to be registered with the Microsoft identity platform.
- We recommend you test connections in a non-production environment before activating in a live environment.
Add the connection
- In Kinde, go to Settings > Environment > Authentication.
- Scroll down to the Enterprise Connections section and select Add connections. The Add connection window opens.
- Select the connection type you want to add and then select Add. Currently we support WS Federated and OpenID types. The connection type is added.
- On the tile for the new connection, select Configure.
- Enter a Connection name. Make this something you can easily identify internally. If you plan to import users into Kinde, make sure the connection name matches the connection name you currently use.
- Enter your Microsoft Azure AD domain.
- Enter the Client ID and Client secret as they appear in the Azure AD.
- Enter Home realm domains. This speeds up the sign in process for users of those domains. Note that all home realm domains must be unique across all connections in an environment. For more information about how, see Home realm domains or IdP discovery.
- If you want, select the Use common endpoint option. Recommended if you use multi-tenancy in MS Azure AD.
- Select extended attributes:
- Extended profile if you want to sync the additional information stored in a user’s MS Azure AD profile to their Kinde user profile.
- Get user groups if you want to sync user groups. Recommended if you manage permissions and access via user groups in MS Azure AD.
- If you want, select Sync user profiles and attributes on sign in. Recommended to keep Kinde user profile data in sync with user profile data from MS Azure AD.
- Copy the Callback URL. You’ll need to enter this in your Microsoft Azure AD app.
- In the Applications section, select the applications you want to activate the connection for.
- Select Save.
- Sign in to the MS Azure Portal (https://portal.azure.com) using your AzureAD account.
- Open the Azure Active Directory page by searching for it in the search bar.
- In the left menu, select App Registrations.
- If no applications are listed, select the All applications tab
- Select your application.
- Select the Redirect URIs links on the right.
- Select Add URI.
- In the relevant field, enter your callback URL (from Step 9 above)
- Select Save.
Make sure you test each connection before enabling in production for your users.
- Go to your test application and attempt to sign in.
- If you left the Home realm domains field blank in Kinde, when you launch your application, you should see a button to sign in. Click it and go to step 4.
- If you completed the Home realm domains field, you should be redirected immediately to your IdP sign in screen.
- Enter your IdP details and complete any additional authentication required.
- In Kinde, go to Settings > Environment > Authentication.
- Scroll down to the Enterprise Connections section and select Configure on the connection you want to edit.
- In the connection details window, update the settings you want.
- In the Applications section, disconnect or reconnect your applications.
- Select Save.