Skip to content

Entra Setup

Tamas Vince Kornel edited this page Dec 1, 2025 · 2 revisions

Enabling OAuth with Microsoft Azure Entra ID (formerly Active Directory) allows your users to sign in and sign up to your application with their Microsoft account.

Get your Microsoft credentials

To use Microsoft as a social provider, you need to get your Microsoft credentials. Which involves generating your own Client ID and Client Secret using your Microsoft Entra ID dashboard account.

Follow only the Register an Application section of the guide at Microsoft Entra ID documentation to create your application.

Important

Make sure you're signed in with your @petrik.hu email account to Microsoft Entra!

Recommended Value/Choice
Name Filc indev
Supported account types Accounts in this organizational directory only
Redirect URI Web: http://localhost:3000/api/auth/callback/microsoft

After you've registered your application, you can find the Client ID and the Directory (Tenant) ID on the application overview page.

Generate a Client Secret

  1. In your registered application, navigate to Certificates & secrets on the left sidebar.
  2. Under Client secrets, click on New client secret.
  3. Add a description (e.g., "Filc indev secret") and set an expiration period.
  4. Click Add.
  5. Copy the generated Value of the client secret immediately, as it will be hidden later.

Configure environment variables

Add the following environment variables to your .env file:

CHRONOS_ENTRA_TENANT_ID=your-tenant-id
CHRONOS_ENTRA_CLIENT_ID=your-client-id
CHRONOS_ENTRA_CLIENT_SECRET=your-client-secret

Built with ❤️

Clone this wiki locally