Skip to main content
All CollectionsPartnerships
Enabling Microsoft Entra ID
Enabling Microsoft Entra ID

Enable Azure Entra ID OAuth for your customers

Updated over a week ago

Step 1: Create web application and enable OAuth

  1. In your Active Azure Directory portal, navigate to App Registration

  2. Register a new application for your Azure Entra ID Account, see below for examples

    1. Name: any name of your choosing

    2. Supported account types: options 2 or 3 are both valid

      1. Accounts in any organizational directory

      2. Accounts in any organizational directory and personal Microsoft accounts

    3. Redirect URI: Web

  3. When you're done, click register!

Step 2: Saving web application values in Merge

  1. Clicking register will take you to a new page with important info to update and save

  2. If you have already set up your app registration you can navigate to this page via Azure Services -> App Registration

  3. Paste the information below into your Microsoft Entra ID Integration Settings.

    1. The Application Id above is your Client Id

    2. The Client Credentials link should show 1 secret, this is your Client Secret

    3. Object Id

    4. Tenant (Directory) Id

Step 3: Auto refreshing Entra credentials

To do this step you must be an application owner or admin.

  1. Navigate back to Entra and in the App Registration page, click on API Permissions

  2. Then enable Application.ReadWrite.All and Directory.ReadWrite.All.

Note: Merge will refresh your credentials automatically before it expires - the default expiration is 180 days from creation. This will prevent your Linked Accounts from disconnecting due to a expired client secret. The new description for the refreshed client secret will "Merge OAuth App Password" + <timestamp of creation date>.

Did this answer your question?