Skip to content

Setting up Microsoft Entra

This guide walks you through configuring Microsoft Entra ID (formerly Azure Active Directory) as your identity provider for DeepIntShield Enterprise. After completing this setup, your users will be able to sign in to DeepIntShield using their Microsoft credentials, with roles and team memberships automatically synchronized.

  • A Microsoft Azure account with access to Entra ID (Azure AD)
  • Admin access to create app registrations
  • DeepIntShield Enterprise deployed and accessible
  • The redirect URI for your DeepIntShield instance (e.g., https://your-deepintshield-domain.com/login)

  1. Sign in to the Azure Portal
  2. Navigate to Microsoft Entra ID (or Azure Active Directory)
  3. Go to App registrations
  4. Click New registration

Configure the registration:

FieldValue
NameDeepIntShield Enterprise
Supported account typesAccounts in this organizational directory only (Single tenant)
Redirect URIWeb: https://your-deepintshield-domain.com/login
  1. Click Register
  1. After registration, note down the following from the Overview page:
Entra App Registration Overview
ValueWhere to Find
Application (client) IDOverview → Essentials
Directory (tenant) IDOverview → Essentials

Configure roles in Entra that map to DeepIntShield’s role hierarchy (Admin, Developer, Viewer).

  1. In your app registration, go to App roles
  2. Click Create app role
  3. Create the following three roles:
Entra App Roles configuration
FieldValue
Display nameViewer
Allowed member typesUsers/Groups
Valueviewer
DescriptionViewer role on DeepIntShield
StateEnabled
FieldValue
Display nameDeveloper
Allowed member typesUsers/Groups
Valuedeveloper
DescriptionDeveloper role on DeepIntShield
StateEnabled
FieldValue
Display nameAdmin
Allowed member typesUsers/Groups
Valueadmin
DescriptionAdmin role on DeepIntShield
StateEnabled

To control which users can access DeepIntShield, enable assignment requirement on the Enterprise Application.

  1. Go to Enterprise applications (from the main Entra ID menu)
  2. Find and select DeepIntShield Enterprise
  3. Go to Properties
Entra Enterprise Application Properties
  1. Set Assignment required? to Yes
  2. Set Enabled for users to sign-in? to Yes
  3. Click Save

DeepIntShield requires a client secret for OAuth authentication.

  1. Go back to App registrationsDeepIntShield Enterprise
  2. Navigate to Certificates & secrets
  3. Click New client secret
Entra Enterprise Client Secrets
FieldValue
DescriptionDeepIntShield Enterprise Secret
ExpiresChoose based on your security policy (e.g., 24 months)
  1. Click Add
  2. Copy the secret value immediately - it won’t be shown again!

Ensure your application has the necessary permissions.

Entra Enterprise API Permissions
  1. In your app registration, go to API permissions

  2. Click Add a permission

  3. Select Microsoft Graph

  4. Choose Delegated permissions

  5. Add the following permissions:

    • openid
    • profile
    • email
    • offline_access (for refresh tokens)
  6. Click Add permissions

  7. If required by your organization, click Grant admin consent for [Your Organization]


By default, Entra includes the roles claim when app roles are assigned. To include group memberships for team synchronization:

  1. Go to Token configuration
  2. Click Add groups claim
  3. Select:
    • Security groups or Groups assigned to the application
    • For token type, enable ID and Access
  4. Click Add

Entra User Assignments
  1. Go to Enterprise applicationsDeepIntShield Enterprise
  2. Navigate to Users and groups
  3. Click Add user/group
  4. Select users or groups
  5. Select the appropriate role (Admin, Developer, or Viewer)
  6. Click Assign

Now configure DeepIntShield to use Microsoft Entra as the identity provider.

  1. Navigate to GovernanceUser Provisioning in your DeepIntShield dashboard
  2. Select Microsoft Entra as the SCIM Provider
  3. Enter the following configuration:
FieldValue
Client IDApplication (client) ID from Azure
Tenant IDDirectory (tenant) ID from Azure
Client SecretThe secret you created in Step 4
AudienceYour Client ID (optional, defaults to Client ID)
App ID URIapi://{client-id} (optional, for v1.0 tokens)
  1. Toggle Enabled to activate the provider
  2. Click Save Configuration
FieldRequiredDescription
tenantIdYesAzure Directory (tenant) ID
clientIdYesApplication (client) ID
clientSecretYesClient secret for OAuth authentication
audienceNoJWT audience for validation (defaults to clientId)
appIdUriNoApp ID URI for v1.0 tokens (e.g., api://{clientId})
userIdFieldNoJWT claim for user ID (default: oid)
rolesFieldNoJWT claim for roles (default: roles)
teamIdsFieldNoJWT claim for group/team IDs (default: groups)

DeepIntShield automatically maps Entra app roles to its internal role hierarchy:

Entra Role ValueDeepIntShield RolePrivilege Level
adminAdminHighest
developerDeveloperMedium
viewerViewerLowest

Multiple Roles: If a user has multiple roles assigned, DeepIntShield automatically selects the highest privilege role. For example, a user with both viewer and developer roles will be assigned the Developer role in DeepIntShield.

Default Role: Users without any assigned role will default to the Viewer role.


  1. Open your DeepIntShield dashboard in a new browser or incognito window
  2. You should be redirected to Microsoft login
  3. Log in with an assigned user
  4. After successful authentication, you’ll be redirected back to DeepIntShield
  5. Verify the user appears in the DeepIntShield users list with the correct role

  • Verify the SCIM provider is enabled in DeepIntShield
  • Check that the DeepIntShield server was restarted after configuration
  • Ensure the Tenant ID and Client ID are correct

”AADSTS50011: The reply URL does not match”

Section titled “”AADSTS50011: The reply URL does not match””
  • Verify the redirect URI in your app registration exactly matches your DeepIntShield login URL
  • Ensure there are no trailing slashes or protocol mismatches (http vs https)

“AADSTS7000215: Invalid client secret”

Section titled ““AADSTS7000215: Invalid client secret””
  • Regenerate the client secret in Azure
  • Ensure you’re using the secret Value, not the secret ID
  • Check for any leading/trailing whitespace when copying
  • Ensure users are assigned to the Enterprise Application with a role
  • Verify app roles are created with the correct lowercase values
  • Check that “Assignment required” is enabled

”AADSTS70011: The provided request includes an invalid scope”

Section titled “”AADSTS70011: The provided request includes an invalid scope””
  • This usually happens when mixing .default scope with other scopes
  • DeepIntShield handles this automatically - ensure you’re using the latest version
  • Verify the groups claim is configured in Token configuration
  • Ensure users are members of the groups
  • Check that groups are created and assigned in Entra
  • Ensure the Tenant ID matches your Azure directory
  • Verify the Client ID is correct
  • Check that the app registration is in the same tenant as your users