Microsoft Entra ID SSO
This guide walks you through connecting Microsoft Entra ID (formerly Azure AD) to Peerdom for single sign-on and automatic user sync. You need admin access to the Microsoft Entra Admin Center to complete these steps.
Step 1: Get your Tenant ID
Open the Microsoft Entra Admin Center or the Azure Portal. Navigate to Microsoft Entra ID > Overview and note your Tenant ID.
Step 2: Register the Peerdom Sync app
Go to App Registrations and create a new application. Add a redirect URI with the following values:
- Type: Web
- Value:
https://backend.peerdom.org/auth/azure/return
Step 3: Create a Client Secret
Open your newly registered Peerdom Sync app. Navigate to Certificates & Secrets and create a new Client Secret. Set the expiration to Never expire. Copy the secret value. You will need it later.
Step 4: Enable API permissions
Go to the API Permissions tab on the Peerdom Sync app and add two Microsoft Graph application permissions:
Directory.Read.AllUser.Read.All
Click Grant admin consent for [your organization] to approve both permissions.
Step 5: Create a Sync Group
Create a group in Entra ID containing the users you want to provision in Peerdom. Add all members who should appear in your Peerdom Directory and note the Group ID.
Step 6: Send credentials to Peerdom
Contact Peerdom support with the following information:
- Tenant ID
- Application (Client) ID for the Peerdom Sync app
- Client Secret value
- Group ID for peer synchronization
- Include subgroups: yes or no
- Avatar synchronization: yes or no
- Default access rights for new users: Member, Editor, or Owner
Peerdom support will complete the connection and confirm that sync is working.
Related
- Single Sign-On (SSO), overview of SSO features and sync behavior
- Google Workspace SSO, alternative provider setup
- Okta SSO, alternative provider setup
- Directory, manage your synced user list