Menu

Authentication & SSO

SSO with Microsoft Entra ID

Single Sign-On (SSO) with Microsoft Entra ID

Overview

Single Sign-On (SSO) allows organizations to connect the Cywift GRC Platform to a centralized Identity Provider (IdP) for authentication.

Cywift supports enterprise identity providers such as Microsoft Entra ID (Azure AD), LDAP directories, that support OAuth 2.0 / OpenID Connect (OIDC) or SAML.

This article explains how to configure Microsoft Entra ID (Azure AD) SSO with Cywift.

Supported SSO Behaviors

Auto-Provisioning & Just-in-Time (JIT) Provisioning

  • User provisioning behavior depends on the IdP configuration and organization policy
  • Users may be created automatically at first login (JIT) or pre-provisioned

SSO-Only Accounts

  • When SSO-only mode is enabled, users cannot set local passwords
  • Authentication is handled exclusively by Microsoft Entra ID

Fallback Authentication

  • Administrators may configure fallback / break-glass accounts
  • Ensures access if the IdP is unavailable

Who Can Configure SSO

  • Administrators only
  • Users with permissions to manage authentication and security settings

Microsoft Entra ID (Azure AD) Configuration

Step 1: Register an Application in Microsoft Entra ID

  • Sign in to the Azure Portal.
  • Go to Microsoft Entra ID → App registrations.
  • Click New registration.
  • Enter an application name (e.g., Cywift SSO).
  • Complete the registration.

Step 2: Configure Redirect URI

  • In the Azure app configuration, add a Redirect URI.
  • Copy the Redirect URI exactly from Cywift

Step 3: Create Client Secret

  • In Azure, go to Certificates & secrets.
  • Create a Client Secret.
  • Copy the secret value securely (it will be shown only once).

Step 4: Configure Microsoft Entra SSO in Cywift

In Cywift, enter the following details:

  • Enable Microsoft Entra ID SSO
  • Tenant ID
  • Client ID
  • Client Secret
  • Redirect URI (auto-generated or copied)
  • Click Save Settings to store the configuration.

Common Troubleshooting

Invalid redirect_uri

  • Ensure the Redirect URI in Azure matches Cywift exactly

Invalid client secret

  • Confirm the secret is valid and not expired

Missing user attributes

  • Configure optional claims in Azure
  • Verify group and email attributes are included
Previous
User & Roles Administration
SSO with LDAP
Previous
Branding & Localisation
SSO with LDAP
Next
This is some text inside of a div block.
Next
SSO with LDAP
This is some text inside of a div block.

In this article