Microsoft Entra ID
Formerly Azure Active Directory
Declaring your Backend API
This step is important so that the access token issued by Entra ID are in JWT format and specificially crafter for for your backend API.
Go to Microsoft Azure Portal.
In the left panel, select "Microsoft Entra ID".
Navigate to "Manage > App Registrations".
Click "New Registration".
Enter "My App - API" as the name, then click Register.
In the left menu, go to "Manage > Expose API".
Click "Add a scope".
Configure as follows, then click "Add Scope":
Application ID URI:
api://my-app-api(then save and continue)Scope name:
access_as_userWho can consent: Admins and Users
Admin Consent Display Name: "View user basic profile"
Admin Consent Description: "Read permission on the basic user profile"
User Consent Display Name: "View your basic profile"
User Consent Description: "Allows the app to see your basic profile (e.g., name, picture, user name, email address)"
State: Enabled
The Application (client) ID if this App Registration will be the audience claim (aud) that you will need to provide to your backend token validation API.
Registering Your Application
Go to Microsoft Azure Portal.
In the left panel, select "Microsoft Entra ID".
Navigate to "Manage > App Registrations".
Click "New Registration".
Enter "My App" as the display name (replace with your actual app name).
Click Register.
Click "Add a Redirect URI".
Click "Add Platform" > "Single-Page Application".
Set Redirect URIs: Add at least two
Production:
https://my-app.com/(include trailing slash; adjust if hosted under a subpath, e.g.,https://my-app.com/dashboard/)Local Development:
http://localhost:5173/(include trailing slash; adjust based on your dev server)
Click Save.
In the left panel, go to "API Permissions".
Click "Add a permission".
Click "APIs My Organization Uses".
Select "My App - API".
Check "access_as_user", then click "Add permission".
In the left panel, click "Overview" and write down somewhere:
CLIENT_ID=<Application (client) ID>DIRECTORY_ID=<Directory (tenant) ID>
These are required to configure oidc-spa.
Providing the parameters to oidc-spa
Last updated
Was this helpful?