Azure AD (OIDC)
Overview
Time to complete: about 15 minutes
What this does: This configuration allows your users to login to Silkline using their Microsoft 365 / Azure AD account.
Steps
Since there are several steps involved in this configuration and testing is required, we recommend scheduling time to walk through these steps together.
These steps will guide you through setting up a new app registration in Microsoft Azure AD to enable Single Sign-On (SSO) into Silkline via OpenID Connect. The configuration will allow Azure AD to serve as the identity provider (IdP) while Auth0 acts as the service managing authentication for your application.
Register a New App in Azure AD
Log in to Microsoft Entra (previously Azure Active Directory) Portal:
Navigate to https://entra.microsoft.com and log in with your Azure AD admin credentials.
Go to App Registrations:
In the left-hand menu, select Azure Active Directory → App registrations
Select New registration button
Register the Application:
Name: Enter a name for the app, such as
Silkline-SSO.Supported Account Types: Please select Single Tenant
Redirect URI: Set this to:
Web:https://silkline.us.auth0.com/login/callback
Click "Register" to create the app.

Gather App Details
From the Overview page of the app registration, and note down the following:
Application (client) ID: This will be used as the Client ID in Silklines Auth0 instance.
Click the “Endpoints” button and grab the OpenID Connect metadata document URL. It should look like this:
https://login.microsoftonline.com/729dfe76-e026-4b14-b5f8-947f2e2af950/v2.0/.well-known/openid-configurationApplication Configuration
Go to the application Authentication section
Enable ID Token for implicit flow:

Implict grant and hybrid flow configuration screenshot Save the changes with the Save button at the top.
Go to the Token configuration section on the left.
Click on Add optional claim. Add:
emailfamily_namegiven_name
When clicking on Add will prompt for permissions for the Microsoft Graph. This is required, so accept this request.
Silkline configuration
Please email your Silkline POC the following information
Application (client) ID
OpenID Connect metadata document URL.
From there, your Silkline team will configure you SSO in the application. We will reach back out to your team when we are ready to test.
⏳ Wait for Silkline to complete your SSO configuration
Let us know once you've completed steps 1-4 and share the required values. We'll then complete the configuration on our end and will let you know when SSO is ready for testing.
Test SSO Configuration
Go to the Silkline application.
Initiate the login flow to ensure the SSO integration with Azure AD works as expected.
If issues occur, reach out to your Silkline POC to verify the client ID, secret, and tenant ID, and check Azure AD logs for troubleshooting.
Video overview (third-party guide)
Last updated