#
Microsoft Azure AD
Curiosity supports Single Sign-On using Microsoft Azure Active Directory (Azure AD).
#
Prerequisites
You will need the following information from the Azure Portal:
- Tenant ID (Directory ID)
- Client ID (Application ID)
- Client Secret
#
Configuration Steps
#
1. Register an Azure Application
- Sign in to the Azure Portal.
- Search for and select App registrations.
- Click + New registration.
- Enter a name (e.g., "Curiosity SSO") and select Accounts in this organizational directory only.
- Set the Redirect URI type to Web and enter:
{domain}/api/microsoftsso/completed-login-attempt - Click Register.
- Note the Application (client) ID and Directory (tenant) ID from the Overview page.
#
2. Generate a Client Secret
- In the app registration, go to Certificates & secrets.
- Click + New client secret.
- Provide a description and choose an expiration period.
- Click Add and copy the secret value immediately; it will not be shown again.
#
3. Configure API Permissions
- Go to Expose an API and click + Add a scope.
- Save the Application ID URI and set a scope name (e.g., "SSO").
- Go to Token configuration and click + Add optional claim.
- Select ID token type and check email.
- When prompted, turn on the Microsoft Graph email permission.
#
4. Enter Details in Curiosity
- In Curiosity, go to Manage > Settings > Accounts > Single Sign-On.
- Select Microsoft.
- Enter the Tenant ID, Client ID, and Client Secret.
- Click Save.
#
Troubleshooting
- Ensure the Tenant ID, Client ID, and Client Secret are entered in the correct fields in Curiosity.
- Verify the Redirect URI matches exactly between Azure and Curiosity.