Microsoft Entra ID
Setup guide for using Microsoft Entra ID as the OIDC provider for the FDK server.
App Registration
- Navigate to Azure Portal > Microsoft Entra ID > App registrations > New registration.
- Name: Choose a name (e.g.,
fdk-server). - Supported account types: Choose based on your requirements (single tenant or multitenant).
- Redirect URI: Set platform to Single-page application (SPA) and URI to
https://<your-server-domain>/api/auth/callback. - Note the Application (client) ID and Directory (tenant) ID.
Authentication Settings
- Go to Authentication.
- Under Implicit grant and hybrid flows, enable ID tokens.
- Under Advanced settings, set Allow public client flows to Yes.
API Permissions
Add the following under Microsoft Graph > Delegated permissions:
openid– Sign users inprofile– View users’ basic profileemail– View users’ email addressoffline_access– Maintain access to data you have given it access to
Token Configuration
- Go to Token configuration > Add optional claim.
- Token type: ID.
- Add:
email,preferred_username.
Group Claims
- Select Add groups claim.
- Choose Security groups.
- Emit as: Group ID.
Server Configuration
AUTH__ISSUER=https://login.microsoftonline.com/<tenant-id>/v2.0
AUTH__CLIENT_ID=<application-client-id>The issuer URL must include
/v2.0 to use the v2.0 OIDC endpoint. The server discovers all endpoints from .well-known/openid-configuration automatically.