This guide walks you through configuring Azure Active Directory (Azure AD) as an OAuth 2.0 Identity Provider for single sign‑on (SSO) in the ShadowMap portal.
Prerequisites
An Azure AD tenant with Global Administrator permissions
Access to the ShadowMap portal with an administrator role
A Redirect URI (the callback URL) for your ShadowMap instance, e.g.:
https://<your-domain>/auth/callback
(Recommended) A test user in Azure AD to verify login
1. Register a New Application in Azure AD
Sign in to the Azure portal.
Navigate to Azure Active Directory > App registrations > New registration.
Configure the registration:
Name:
ShadowMap SSO
Supported account types: Choose Accounts in this organizational directory only (or as required).
Redirect URI: Select Web, then enter your ShadowMap callback URL:
https://<your-domain>/auth/callback
Click Register.
2. Generate Client Secret (OAuth 2.0)
In the new registration, go to Certificates & secrets.
Under Client secrets, click New client secret.
Add a description (e.g.,
ShadowMap SSO Secret
) and choose an expiration period.Click Add.
Copy the generated Value immediately. This is your Client Secret.
3. Collect OAuth Details
In your Azure AD app registration overview, note the following values:
Field | Value location |
---|---|
Tenant (Directory) ID | Overview > Directory (tenant) ID |
Application (Client) ID | Overview > Application (client) ID |
Authorization Endpoint | https://login.microsoftonline.com/<TENANT_ID>/oauth2/v2.0/authorize |
Token Endpoint | https://login.microsoftonline.com/<TENANT_ID>/oauth2/v2.0/token |
Scopes | openid profile email |
4. Configure ShadowMap Portal
Sign in to the ShadowMap portal as an administrator.
Navigate to Settings > SSO Authentication.
Fill in the OAuth details collected above:
Provider: Azure AD
Client ID:
<Application (Client) ID>
Client Secret:
<Client Secret>
Tenant ID:
<Directory (Tenant) ID>
Click Save.
5. Verify Configuration
Log out of ShadowMap.
On the login page, select Sign in with Azure AD.
Authenticate using your test Azure AD user.
Confirm successful redirection back to ShadowMap and access granted.
Troubleshooting Tips
Invalid redirect URI: Ensure the callback URL exactly matches the one registered in Azure AD.
Consent prompt: If users see a consent screen, grant admin consent under API permissions > Grant admin consent.
Expired client secret: Monitor and renew before expiration in Certificates & secrets.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article