-
Notifications
You must be signed in to change notification settings - Fork 1
Entra Setup
Enabling OAuth with Microsoft Azure Entra ID (formerly Active Directory) allows your users to sign in and sign up to your application with their Microsoft account.
To use Microsoft as a social provider, you need to get your Microsoft credentials. Which involves generating your own Client ID and Client Secret using your Microsoft Entra ID dashboard account.
Follow only the Register an Application section of the guide at Microsoft Entra ID documentation to create your application.
Important
Make sure you're signed in with your @petrik.hu email account to Microsoft Entra!
| Recommended | Value/Choice |
|---|---|
| Name | Filc indev |
| Supported account types | Accounts in this organizational directory only |
| Redirect URI | Web: http://localhost:3000/api/auth/callback/microsoft
|
After you've registered your application, you can find the Client ID and the Directory (Tenant) ID on the application overview page.
- In your registered application, navigate to Certificates & secrets on the left sidebar.
- Under Client secrets, click on New client secret.
- Add a description (e.g., "Filc indev secret") and set an expiration period.
- Click Add.
- Copy the generated Value of the client secret immediately, as it will be hidden later.
Add the following environment variables to your .env file:
CHRONOS_ENTRA_TENANT_ID=your-tenant-id
CHRONOS_ENTRA_CLIENT_ID=your-client-id
CHRONOS_ENTRA_CLIENT_SECRET=your-client-secretBuilt with ❤️