Azure Entra External ID
Prerequisites
- Azure account with appropriate permissions
- Azure External ID tenant created
Configuration Steps
Step 1: Access Azure Portal
- Navigate to Azure Portal (https://portal.azure.com)
- Search for Microsoft Entra External ID or External Identities
- Select your External ID directory
Step 2: Select or Register Application
- In left sidebar, navigate to App registrations
- If you have an existing app registration: Click on it to open settings, then skip to Step 4 (or Step 3 if you need a new secret)
- If registering new: Click New registration
Step 3: Configure Application Registration (New Apps Only)
- Configure application:
- Name: Enter "Frontegg AgentLink"
- Supported account types: Select appropriate option:
Accounts in this organizational directory only(Single tenant)
- Redirect URI:
- Platform:
Web - URI:
https://[YOUR-FRONTEGG-DOMAIN]/oauth/callback
- Platform:
- Click Register
Step 4: Create or Verify Client Secret
- In app registration page, navigate to Certificates & secrets in left sidebar
- Click Client secrets tab
- If you have an existing valid secret: You can use it (if you have it saved), otherwise create new
- If creating new: Click New client secret
- Description: Enter "Frontegg AgentLink Secret"
- Expires: Select expiration period (recommended: 12-24 months)
- Click Add
- If creating new: Click New client secret
- IMPORTANT: Immediately copy the Value - it won't be shown again
Step 5: Obtain Application Credentials
- Navigate to Overview page of your app registration
- Copy Application (client) ID
- Copy Directory (tenant) ID
Step 6: Configure API Permissions (Required if not already configured)
- Navigate to API permissions in left sidebar
- Verify required permissions exist. If not, click Add a permission
- Select Microsoft Graph
- Select Delegated permissions
- Ensure these permissions are added:
openidprofileemailUser.Read
- Click Add permissions (if adding new)
- Click Grant admin consent for [Directory] (if you have permissions and consent not yet granted)
Step 7: Configure Authentication Settings (Verify redirect URIs)
- Navigate to Authentication in left sidebar
- Under Platform configurations → Web:
- Verify (or add) Frontegg redirect URI:
https://[YOUR-FRONTEGG-DOMAIN]/oauth/callback
- Verify (or add) Frontegg redirect URI:
- Under Implicit grant and hybrid flows, optionally enable:
- ID tokens (for implicit flows, if needed)
- Click Save if changes made
Configuration Values for Frontegg
provider: azure-external-id
issuer_url: https://login.microsoftonline.com/[tenant-id]/v2.0
client_id: [Application (client) ID]
client_secret: [Client secret Value]Alternative Issuer URLs:
- For External ID specific endpoint:
https://[tenant-name].ciamlogin.com/[tenant-id]/v2.0 - For Azure AD B2C:
https://[tenant-name].b2clogin.com/[tenant-id]/v2.0