Search Results :

×

How to Configure Azure AD SSO for OAuth via WordPress

Azure AD SSO for OAuth uses WordPress Authorization flow to provide users secure access to WordPress sites. With our OAuth Single Sign-On (SSO) plugin for WordPress, Azure AD acts as the OpenID Connect and OAuth provider, ensuring secure login for WordPress websites. The integration of Azure AD for WordPress simplifies and secures the login process using Azure AD SSO. Our Azure AD SSO for WordPress solution helps to secure SSO for WordPress login so that users are authenticated using their Azure AD / Office 365 / Microsoft Ultra ID login credentials. Seamless support for advanced SSO features like Attribute & Group Mapping, Synchronize WordPress user’s details with Azure AD Office 365, Azure AD Multi-Tenancy SSO login support, Populate Employee information from Azure AD to WordPress, Intranet SSO / Internet SSO, Mapping the profile picture from Azure AD / Office 365 to your WordPress avatar, etc.

Explore Our SAML Single Sign-On Solution for WordPress Know more Open in new tab

Azure AD for WordPress Integration
By miniOrange

Azure integration for WordPress provides functionality to manage all the user operations from your WordPress site. [Sync user profile from WordPress to Microsoft Entra ID (Azure AD)]

Know More

Follow these quick & simple steps to set up Azure AD SSO for WordPress.

  • Sign in to Microsoft Entra ID (Azure AD) portal.
  • Select Microsoft Entra ID (Azure AD).
  • Azure AD SSO for WordPress - Login
  • In the left-hand navigation panel, click the App registrations service, and click New registration.
  • Azure AD SSO for WordPress - App-Registration
  • Configure the following options to create a new application.
    • Enter a name for your application under the Name text field.
    • In supported account types, select 3rd option ‘Accounts in any organizational directory (for authenticating user with user flows).
    • In the Redirect URI section, select the Web application and enter the Callback URL from the miniOrange OAuth Client plugin (Configure OAuth tab) and save it under the Redirect URL textbox.
    • Click on the Register button to create your application.
    • Azure AD SSO for WordPress - Create
  • Microsoft Entra ID (Azure AD) assigns a unique Application ID to your application. The Application ID is your Client ID and the Directory ID is your Tenant ID, keep these values handy as you will need them to configure the miniOrange OAuth Client plugin.
  • Azure AD SSO for WordPress - Overview
  • Go to Certificates and Secrets from the left navigaton panel and click on New Client Secret. Enter description and expiration time and click on ADD option.
  • Azure AD SSO for WordPress - secret-Key
  • Copy the secret key "value" and keep the value handy it will be required later to configure Client Secret under the miniOrange OAuth Client Plugin.
  • Note and Contact Us - SSO between two WordPress sites

    Note: The client secret for your developer application will expire in 180 days. To ensure continued functionality, you will need to generate a new client secret before the expiration and update it in the OAuth Single Sign-On plugin.


    Azure AD SSO for WordPress - Secret-Key-2

    In conclusion , by successfully configuring Azure AD as OAuth Provider, you have enabled Azure AD SSO Login for WordPress and authorization for your end users into WordPress.


  • Go to Configure OAuth tab and click Add New Application to add a new client application into your website.
  • Azure AD SSO for WordPress - Add new application
  • Choose your Application from the list of OAuth / OpenID Connect Providers, Here Microsoft Entra ID (Azure AD).
  • Azure AD SSO for WordPress - Select Application
  • After selecting the provider copy the Callback URL which needs to be configured in OAuth Provider's SSO application Configuration.
  • Enter the Client Credentials like Client ID & Client Secret which you will get from the Microsoft Entra ID (Azure AD) SSO application.
  • If you want to allow SSO from Microsoft Entra ID (Azure AD) single-tenant into your WordPress site then configure Tenant ID found from the Microsoft Entra ID (Azure AD) SSO application. For configuring Scopes & Endpoints for Microsoft Entra ID (Azure AD) Single-tenant click here.
  • OR

  • If you want to allow login into your WordPress site from any Microsoft Entra ID (Azure AD) tenant, then enter the tenant value as 'common' in the plugin configuration. For the Scopes & Endpoints click here.
  • Click on Next.
  • Azure AD SSO for WordPress - Add App name, TenantID
  • After verifying all the details on the summary page, click on Finish to save the configuration as well as test the Azure AD SSO connection.
  • Azure AD SSO for WordPress - Finish configuration

    In conclusion, by successfully configuring WordPress as OAuth Client, you've established effortless Azure AD OAuth Single Sign-On (SSO) and authorization for your users accessing WordPress.

  • Go to Configure OAuth tab and search your application name to add a new client application into your website, Here Microsoft Entra ID (Azure AD).
  • Azure AD SSO for WordPress - Add new application
  • Configure App Name, Client ID, Client Secret, Tenant ID from Microsoft Entra ID (Azure AD) SSO application. For the Scopes & Endpoints click here.
  • Looking for setting up Login flow for Multi-tenant Microsoft Application? Please click here.


    Azure AD SSO for WordPress - Add App name, TenantID
  • Choose your Grant Type from the list of options & Click on Save Settings to save the configuration..
  • Azure AD SSO for WordPress - Add Grant Type

    In conclusion , by successfully configuring WordPress as OAuth Client, you have enabled seamless Azure AD SSO for WordPress Login and authorization for your end users into WordPress.

  • User Attribute Mapping is mandatory for enabling users to successfully login into WordPress. We will be setting up user profile attributes for WordPress using below settings.
  • Finding user attributes:

    • Go to Configure OAuth tab. Scroll down and click on Test Configuration.
    • Azure AD SSO for WordPress - OAuth Test Configuration
    • You will see all the values returned by your OAuth Provider to WordPress in a table. If you don't see value for First Name, Last Name, Email or Username, make the required settings in your OAuth Provider to return this information.
    • Once you see all the values in Test Configuration, go to Attribute / Role Mapping tab, you will get the list of attributes in a Username dropdown.
    • Azure AD SSO for WordPress - WordPress Attribute Mapping

  • Go to Application → Select the application where you want to configure the group mapping for Azure AD SSO for WordPress. Now, Go to the API Permissions tab.
  • Azure AD SSO for WordPress - API Permissions
  • Click on the Add permission button, and then Microsoft Graph API -> Delegated Permissions and select openid, Profile scope and click on the Add Permissions button.
  • Azure AD SSO for WordPress - Request API Permissions
  • Click on the Grant consent for Demo button.
  • Go to Manifest tab and find groupMembershipClaims and changes it’s value to "All" and click on the save button.
  • Azure AD SSO for WordPress - Group Membership Claims
  • Now you would be able to get the group's value in the Test configuration window.
  • Azure AD SSO for WordPress - Group Mapping Test Configuration
  • You can follow the role mapping section to map the groups to Azure AD SSO for WordPress.

4.1 OAuth for WordPress - Groups/Profile Mapping [Premium]

  • Go to the Attribute Mapping section in the plugin and map the Attribute Names from the Test Configuration table. Make sure Enable Role Mapping option is enabled and click on the Save Settings button. (Refer to the screenshot)
  • Azure AD SSO for WordPress - attribute mapping
  • Scroll down and go to the Role Mapping section, you need to map Group Attribute Name. Select the attribute name from the list of attributes that return the groups from the test configuration table of Azure Active Directory (Azure AD).
    Eg:Groups
  • Azure AD SSO for WordPress - role mapping
  • Assign the WordPress role to the Provider Groups: Based on the Azure Active Directory (Azure AD) application, you can allocate the WordPress role to Azure AD Groups. Add the Azure AD group's value under Group Attribute Value and assign the required WordPress role in front of it under WordPress Role.
    For example, in the below image. Group value has been assigned the role of Subscriber.
  • Azure AD SSO for WordPress - role mapping exmaple
  • After saving the mapping, the Azure Active Directory group will be allocated the WordPress Subscriber role following the implementation of Azure AD SSO.
    Example: As per the given example, a User with group value will be added as a administrator.

4.2 OAuth for WordPress - Microsoft Entra ID (Azure AD) Claim Mapping [Premium]

  • Go to your application in Azure Active Directory (Azure AD) and select Token configuration from the left menu.
  • Click on Add optional claim and then select ID from the right section.
  • Now choose all the attributes you want to fetch while performing Single Sign-On (SSO) with Azure Active Directory (e.g family_name, given_name, etc) and click on Add button.
  • You might see a popup to Turn on the Microsoft Graph profile permission (required for claims to appear in token), enable it, and click on Add button.
  • Azure AD SSO for WordPress - Custom Attribute Mapping

  • Sign into Microsoft Entra ID (Azure AD) Portal.
  • Select Microsoft Entra ID (Azure AD).
  • In the left-hand navigation panel, click the Enterprise applications.
  • Azure AD SSO for WordPress - Click Enterprise Applications
  • Select your Azure Enterprise Application.
  • Then select the Single sign-on (SSO) option in the left-hand menu and open the Attributes & Claims section.
  • Azure AD SSO for WordPress - Select your App
  • Click on Add new claim.
  • Azure AD SSO for WordPress - Select your App
  • Then configure the required fields as below:
  • Name : As per your choice (this will be your Attribute name)
    Source: Attribute
    Source attribute: For eg: search for user.department in the dropdown
    Azure AD SSO for WordPress - Select your App
  • Now navigate to App registrations, select your application, and then go to the Manifest tab on the left and set "acceptMappedClaims": true
  • Azure AD SSO for WordPress - Select your App
  • After following the above steps, you can create multiple claims as per your requirements.
  • Please try to perform the Test Configuration in the OAuth SSO plugin for WordPress. You'll get a new attribute as shown below:
  • Azure AD SSO for WordPress - mapping test result

  • Go to WordPress Left Panel > Appearances > Widgets.
  • Select miniOrange OAuth. Drag and drop to your favourite location and save.
  •  Azure AD  Single Sign-on (SSO) - WordPress create-newclient login button setting
  • Go to WordPress Left Panel > Appearances > Widgets.
  • Select miniOrange OAuth. Drag and drop to your favourite location and save.
  • Azure AD   Single Sign-on (SSO) - WordPress create-newclient login button setting
  • Open your Azure AD SSO for WordPress login button there. You can test the Azure AD Single Sign-On (SSO) - Azure AD OAuth now.
  • Make sure the "Show on login page"option is enabled for your application. (Refer to the below image)
  • Azure AD Single Sign-on (SSO) - Azure AD OAuth - WordPress create-newclient login button setting
  • Now, go to your WordPress Login page. (Eg. https://< your-wordpress-domain >/wp-login.php)
  • You will see an Azure AD SSO login button there. Once you click the login button, you will be able to test the Azure AD Single Sign-On (SSO) - Azure AD OAuth.
  • Azure AD  Single Sign-on (SSO) - WordPress create-newclient login button setting

  • Please refer the Scope and endpoints table provided below to authorize Single Sign-On (SSO) with Azure AD single-tenant environment to your WordPress site.
    • Scope: openid
      Authorize Endpoint: https://login.microsoftonline.com/<tenant-id>/oauth2/v2.0/authorize
      Access Token Endpoint: https://login.microsoftonline.com/<tenant-id>/oauth2/v2.0/token
      Get User Info Endpoint: https://login.windows.net/<tenant-id>/openid/userinfo
      Custom redirect URL after logout:[optional] https://login.microsoftonline.com/<tenant-id>/oauth2/logout?post_logout_redirect_uri=<your URL>
  • Please refer the Scope and endpoints table provided below to authorize Single Sign-On (SSO) with any Azure AD tenant environment to your WordPress site.
    • Scope: openid
      Authorize Endpoint: https://login.microsoftonline.com/common/oauth2/v2.0/authorize
      Access Token Endpoint: https://login.microsoftonline.com/common/oauth2/v2.0/token
      Get User Info Endpoint: https://login.windows.net/common/openid/userinfo
      Custom redirect URL after logout:[optional] https://login.microsoftonline.com/common/oauth2/logout?post_logout_redirect_uri=<your URL>
    More Troubleshooting Errors ➔

    To fix this issue while configuring Azure AD SSO for WordPress, please configure the correct Authorization Endpoint in the plugin. You can confirm the correct format of the endpoint from here.

    If you face this issue while performing Azure AD SSO for WordPres login with OAuth, please configure the correct Client Secret in the plugin. You can refer to this step to configure correct client secret in the setup guide.

    To fix this issue while configuring Azure AD SSO for WordPress, please configure the 'common' endpoints in the plugin or add users in the tenant . You can refer to this setup guide to configure the common endpoints.

    Please configure the correct Redirect URL in the Microsoft Entra ID (Azure AD) Developer application from the plugin If you face this issue while configuring Azure AD OAuth Single Sign-On (SSO). You can refer to this steps in the setup guide.

    To fix this issue, please generate a new client secret in your Microsoft Entra ID (Azure AD) Developer app and update it in the plugin. You can create and configure the new client secret by following the steps in this FAQ.


    In SSO for WordPress plugin, Select your Configured Microsoft Entra ID (Azure AD) application and in the field of Azure AD Tenant, replace the current tenant id with ‘common’ as shown in the below screenshot. Now users from any Azure directory will be able to perform Azure AD OAuth SSO and also users with personal Microsoft accounts can login. read more

    Microsoft Entra ID (Azure AD) recently released OAuth 2.0 endpoints. You need to replace the token endpoint with the one below. You also need to change the grant type to password grant in the dropdown and replace the tenant ID with your Microsoft Entra ID (Azure AD) tenant ID. (Refer to the below image) Read more

    Sign in to your Microsoft Entra ID (Azure AD) portal and select your Microsoft Entra ID (Azure AD) where you have Azure AD OAuth SSO. Select Enterprise applications. Read more



     Thank you for your response. We will get back to you soon.

    Something went wrong. Please submit your query again

    We'll Reach Out to You at the Earliest!


    ADFS_sso ×
    Hello there!

    Need Help? We are right here!

    support