SSO with Microsoft Entra ID
Firezone supports authenticating users with Microsoft Entra ID using Firezone's public OAuth client. You can configure multiple Entra providers — one per tenant — to authenticate users from different organizations.
Looking for directory sync? See the Entra directory sync guide to automatically provision users and groups from Microsoft Entra ID.
Enable Entra authentication
To enable Entra authentication:
- Go to
Settings -> Authenticationin your admin portal. - Click Add Provider and select Entra.
- Name the provider — this is shown to users on the sign-in page.
- Select the authentication context:
- Client Applications and Admin Portal: Users can sign in to both the Firezone client applications and admin portal using Entra SSO.
- Client Applications Only: Users can sign in to the Firezone client applications using Entra SSO but not the admin portal.
- Admin Portal Only: Users can sign in to the admin portal using Entra SSO but not the Firezone client applications.
- Portal session lifetime: (optional) Set a custom session lifetime for users signing in to the admin portal with Entra SSO. Leave blank to use the default session lifetime.
- Client session lifetime: (optional) Set a custom session lifetime for users signing in to the Firezone client applications with Entra SSO. Leave blank to use the default session lifetime.
- Click Verify Now to complete an authentication flow. This captures your Entra tenant ID — verify this is the correct tenant before proceeding.
- Click Save.
Users will now see this provider as an option on the Firezone sign-in page.
How it works
Firezone uses a public OAuth client to authenticate users with Microsoft Entra ID. When a user signs in:
- They're redirected to Microsoft's sign-in page.
- After authenticating with Microsoft, they're redirected back to Firezone.
- Firezone matches the user using the
issandsubclaims from Entra. For users provisioned via directory sync, this identity already exists. For manually created users, Firezone matches by email on first sign-in and saves the Entra identity for subsequent sign-ins.
No app registration or client secret setup is required on your end.
Data accessed
Firezone requests the following scopes from Microsoft:
openid— Required for authenticationemail— Used to match users on first sign-inprofile— Used for the user's display nameoffline_access— Used to maintain the session
Firezone does not access your email, calendar, files, or any other Microsoft 365 data.
Multiple tenants
You can configure multiple Entra providers to authenticate users from different Microsoft tenants. Each provider is tied to a single tenant ID.
To add another tenant:
- Go to
Settings -> Authenticationin your admin portal. - Click Add Provider and select Microsoft Entra.
- Enter the new tenant's Entra Tenant ID.
- Complete the setup as described above.
Users from each tenant will see a separate sign-in option on the Firezone sign-in page.
Restricting access to specific users or groups
Entra admins can control which users and groups are allowed to sign into Firezone by configuring user assignment on the Firezone Enterprise Application in your tenant.
To restrict access:
- Sign in to the Azure portal.
- Go to Microsoft Entra ID → Enterprise applications.
- Search for and select the Firezone application.
- Go to Users and groups.
- Click Add user/group to assign specific users or groups.
- Go to Properties and set Assignment required? to Yes.
With assignment required enabled, only users and groups explicitly assigned to the Firezone application will be able to sign in.
On Enterprise plans, these assignments also apply to directory sync when the Assigned groups only option is selected for the Entra directory. Only users and groups assigned to the Firezone application will be synced.
If you enable Assignment required without assigning any users or groups, all users in that tenant will be blocked from signing into Firezone.
Provisioning users
Users must exist in Firezone before they can sign in with Entra. You can:
- Create users manually in the admin portal or via the REST API
- Enable Entra directory sync (Enterprise plans) to automatically provision users and groups from Microsoft Entra ID
Troubleshooting
User not found
If a user sees a "user not found" or similar error when signing in, it means no matching user exists in Firezone. The user must be created manually or provisioned via directory sync before they can sign in.
Access denied by Entra admin
If a user sees "AADSTS50105" or "You cannot access this application", it means the Entra admin has enabled user assignment and the user is not assigned to the Firezone application. See Restricting access above.
Wrong tenant
If a user authenticates with a Microsoft account from a different tenant than the one configured, they'll see an error. Ensure the user is signing in with an account from the correct tenant, or add an additional Entra provider for their tenant.
Revoking access
Users can revoke Firezone's access to their Microsoft account from their Microsoft account security settings. Revoking access does not delete the user from Firezone or end their active sessions, but they will need to re-authorize on their next sign-in.
Need additional help?
See all support options or try asking on one of our community-powered support channels:
- Discussion forums: Ask questions, report bugs, and suggest features.
- Discord server: Join discussions, meet other users, and chat with the Firezone team
- Email us: We read every message.