Atria Configuration - Configure Entra ID as an iDP provider
Ben Williams
36 steps
4 minutes
Atria
1
Navigate to Entra ID then to 'App Registrations'
2
Click "New registration"
3
Click this text field.
4
Type "Atria OIDC Connection"
5
Click "Select a platform"
6
Click "Web"
7
Click the "e.g. [https://example.com/auth](https://example.com/auth)" field.
8
Paste the CallBack url - For example, https://atriaweb/oidc/link/callback
9
Click "* Name The user-facing display name for this application (this can be changed later). Supported account types Who can use this application or ac..."
10
Click "Register"
11
Navigate to the Redirect URIs
12
Click "Add Redirect URI"
13
Click "Build, host, and deploy a web server application. .NET, Java, Python"
14
Paste the additional callback URL, i.e. 'https://atriaweb/oidc/callback'
15
Click "Configure"
16
Click here.
17
Click "Certificates & secrets"
18
Click "New client secret"
19
Add a memorable name, for the Secret
20
Enter a Expiry Date - Please note, once this expires it will need to be regenerated.
21
Save the Secret ID and Secret Value to your Secure Password Storage.
22
Click "API permissions"
23
Click "Add a permission"
24
Click "Microsoft Graph"
25
Select 'Delegated Permissions'
26
Click the "Search box" field.
27
Search for OpenID and select 'openid, Signs users in'
28
Add the permission "Email, View users' email address"
29
Search or select 'User.Read' permission under 'User'
30
Once the permissions have been added, select 'Grant Admin Consent for {CustomerName}'
31
Click "Yes"
32
Click "Overview"
33
Copy the Application (Client) ID from the 'Overview' Page
34
Navigate back to Atria, and select create a new Authentication Provider
35
Fill our the required properties from your iDP provider. For this example we are using Entra ID
36
For Entra ID, we recommend you select 'preffered_username' and the User Properties is 'UPN'.