Azure AD (OIDC)
Overview
Time to complete: about 15 minutes
What this does: This configuration allows your users to login to Silkline using their Microsoft 365 / Azure AD account.
Steps
Since there are several steps involved in this configuration and testing is required, we recommend scheduling time to walk through these steps together.
These steps will guide you through setting up a new app registration in Microsoft Azure AD to enable Single Sign-On (SSO) into Silkline via OpenID Connect. The configuration will allow Azure AD to serve as the identity provider (IdP) while Auth0 acts as the service managing authentication for your application.
Register a New App in Azure AD
Log in to Microsoft Entra (previously Azure Active Directory) Portal:
Navigate to https://entra.microsoft.com and log in with your Azure AD admin credentials.
Go to App Registrations:
In the left-hand menu, select Azure Active Directory → App registrations
Select New registration button
Register the Application:
Name: Enter a name for the app, such as
Silkline-SSO
.Supported Account Types: Please select Single Tenant
Redirect URI: Set this to:
Web
:https://silkline.us.auth0.com/login/callback
Click "Register" to create the app.

Gather App Details
From the Overview page of the app registration, and note down the following:
Application (client) ID: This will be used as the Client ID in Silklines Auth0 instance.
Click the “Endpoints” button and grab the OpenID Connect metadata document URL. It should look like this:
https://login.microsoftonline.com/729dfe76-e026-4b14-b5f8-947f2e2af950/v2.0/.well-known/openid-configuration
Application Configuration
Go to the application Authentication section
Enable ID Token for implicit flow:
Implict grant and hybrid flow configuration screenshot Save the changes with the Save button at the top.
Go to the Token configuration section on the left.
Click on Add optional claim. Add:
email
family_name
given_name
When clicking on Add will prompt for permissions for the Microsoft Graph. This is required, so accept this request.
Test SSO Configuration
Go to the Silkline application.
Initiate the login flow to ensure the SSO integration with Azure AD works as expected.
If issues occur, reach out to your Silkline POC to verify the client ID, secret, and tenant ID, and check Azure AD logs for troubleshooting.
Video overview (third-party guide)
Last updated