Entra ID single sign-on setup

Published: August 13, 2024Last updated: November 28, 2025

Entra ID (Azure AD) integration setup

  1. Create a new App registration in your Azure AD portal:

    Create new app

  2. Choose Single tenant account type:

    02

  3. Copy the Application (client) ID and Directory (tenant) ID from Azure to Ciso:

    03

  4. Enter these in Ciso under the Settings menu > Global Settings > Azure AD:

    client tenant id entra

  5. Next, copy the Redirect URI from Ciso and enter it in the Azure App Registration: Authentication > Add platform > Web > Redirect URI

    05

  6. Next, add the following permissions to the application: Manage > API permissions > Add a permission. NOTE: Make sure both Delegated and Application permissions are added!

    permissions entra

  7. Finally, create a new Client Secret in Azure, and copy it to Ciso Certificates & secrets > Client secrets > New client secret:

    06

  8. Copy the Value of the generated secret (not the ID) and paste it to the client secret field in Ciso. Note this value is only shown once! If you lose it, or when it expires, you will have to create a new secret and repeat this step!

    copy secret entra

  9. Copy to Ciso:

    client secret entra

  10. Everything is now setup for new users in your domain to log in to Ciso, and you should see a new option in the login screen for this:

    login entra

Notes

New users who have not previously been given any specific role in Ciso will get the default permission role defined in Ciso under Organization > Roles & Permissions. You can change thus by unlocking the role table and selecting another role as default.

default role entra

If you want to restrict default Ciso access to a limited group of users only, you can add a security group id in the Ciso Azure settings. Note that this requires you to delegate the GroupMember.Read.All API permission to the Ciso app registration in your Azure settings.

groupid entra

Permissions

In order to see which users have access to Ciso through Entra ID you need to give your application permission to make certain Microsoft Graph API calls. In the Entra ID menu, select "App registrations", then find the app registered for Ciso. Select "API permissions" and add the following application permissions:

  • GroupMember.Read.All
  • User.Read.All