Integration of Azure AD Login (Azure Active Directory OAuth Single Sign-On) with Magento using OAuth 2.0 Protocol.
The Magento OAuth / OpenID Connect Single Sign-On (SSO) extension makes it easy to use OAuth2 to set up Azure AD Login on Magento (Azure AD Single Sign on).
The extension can be set up using other Social Media sources, as well as custom OAuth and OIDC providers. It contains a lot of Single Sign-On (SSO) features, like Attribute Mapping for user profiles, Role Mapping, and so on. In this guide, we'll go over how to set up SSO between Magento and Azure AD. At the end of this article, users should be able to log into Magento using Azure AD. Click here to read more about the Magento OAuth Single Sign-On (OAuth & OpenID Connect Client) extensions extra features.
The Magento OAuth & OpenID Connect Single Sign-On (SSO) extension makes it possible to log into Magento securely using Azure AD as an OAuth and OpenID Connect provider. You can also use alternative OAuth providers, such as Azure B2C, Office 365, and other custom providers, to configure the extension. Advanced Single Sign-On features such as user profile Attribute Mapping, Role Mapping, and so on are supported. We'll go over how to set up SSO between Magento and Azure AD in this article. Users should be able to log in to Magento through Azure AD by the end of this guide.
Click here to know more about other features we provide in Magento OAuth Single Sign-On ( OAuth & OpenID Connect Client ) extension
You can refer the steps to configure Azure AD for Magento OAuth SSO from the video or documentation given below:
In the left-hand navigation pane, click the App registrations service, and click New registration.
Enter the Name of your application.
Select the supported account types checkbox.
Select the platform as Web.
Copy Callback URL from the miniOrange OAuth Client extension (Configure OAuth tab) and save it under the Redirect URL textbox.
Make sure the "Grant admin consent to openid and offline_access permissions" option is enabled. When finished, click Register.
Azure AD assigns a unique Application ID to your application. The Application ID is your Client ID and the Directory ID is your Tenant ID, keep these values handy as you will need them to configure the miniOrange OAuth Client extension.
Copy the Application (Client) ID and paste it as Client ID in miniOrange OAuth Client extension.
Now, Go to Certificates and Secrets from the left navigaton pane and click on New Client Secret. Enter description and expiration time and click on ADD option.
Copy the secret key "value" and paste it as Client Secret under the miniOrange Magento OAuth Client extension.
Navigate to API Permission tab from the left pane and click on Add a permission option.
Click on Microsoft Graph.
Select Delegated Permission option.
Enable permissions for Email, OpenID, and Profile and click on Add permission button.
2. Configuring Magento 2 as OAuth Client
After successfully configuring OAuth Provider, go to OAuth Provider tab and configure OAuth Provider Name, Client ID, Client Secret, Scope and provided endpoints.
Please refer below Endpoints to configure the OAuth client
You will see all the values returned by your OAuth Provider to Magento in a table. If you don't see value for First Name, Last Name, Email or Username, make the required settings in your OAuth Provider to return this information.
3. Sign-In Settings
Navigate to Sign-in Settings tab. Here you find the option the enable the login link on Admin*/Customer Login Page (*Admin SSO is available in the premium versions)
If you want to initate SSO from any page you can also use the SSO link provided in the extension.
The Premium extension also provides you the the feature to auto redirect your user to the IdP Login Page if the user is not already logged in.
Go to customer login page and you will see the SSO button on your frontend. Click on the button and test the SSO.
You will be sucessfully logged in into Magento.
Visit your admin login page and you will see the SSO button on your admin page. Click on the button to initate SSO as an admin.
After sucessfully logged into magento as admin you will be redirect to magento backend dashboard.
Attribute / Custom Attribute Mapping (Optional). *This is Premium feature.
1.1: Attribute Mapping (Optional). *Available in Premium Versions.
You can map attributes in the Attribute Mapping tab. Only username and email are allowed to be mapped in free version of the extension. However, in the premium version of the extension, you can map various attributes coming from your OAuth Provider to the attributes present in your Magento site.
1.2: Custom Attribute Mapping (Optional). *This is Premium feature.
Enter your table name in Table field.
Enter attribute name as your column name (in the respective table)
Click on Add button for adding custom magento attribute and map the respective field with the attribute receiving from your identity provider
Click on save button for saving the configuration.
You can also delete the configuration by entering the name in attribute name field and then click on delete button.
Role Mapping (Optional). *This is Premium feature.
You can specify a default role in the free extension that will be allocated to all non-admin users when they conduct SSO.
Go to Attribute/Role mapping tab and navigate to Role Mapping section.
Select the Default Role and click on the Save button.
By configuring Azure AD as an OAuth Provider and Magento as an OAuth Client using our Magento OAuth Client extension, you have successfully installed Magento Azure AD (Active Directory) Single Sign-On (SSO). Within minutes, you'll be able to provide safe access to your Magento site utilising Azure AD login credentials thanks to this solution.
If you dont hear from us within 24 hours, please feel free to send a follow up email to firstname.lastname@example.org
This privacy statement applies to miniorange websites describing how we handle the personal
When you visit any website, it may store or retrieve the information on your browser, mostly in the
form of the cookies. This information might be about you, your preferences or your device and is
mostly used to make the site work as you expect it to. The information does not directly identify
you, but it can give you a more personalized web experience.
Click on the category headings to check how we handle the cookies.
Strictly Necessary Cookies
Necessary cookies help make a website fully usable by enabling the basic functions like site
navigation, logging in, filling forms, etc. The cookies used for the functionality do not store any
personal identifiable information. However, some parts of the website will not work properly without
These cookies only collect aggregated information about the traffic of the website including -
visitors, sources, page clicks and views, etc. This allows us to know more about our most and least
popular pages along with users' interaction on the actionable elements and hence letting us improve
the performance of our website as well as our services.