About Microsoft Entra ID Native Integration
Microsoft Entra ID Native integration in Iru Endpoint allows you to set up native Microsoft Entra ID integration for SSO, enabling users to authenticate using their Microsoft Entra ID credentials through OAuth2/OpenID Connect.
How It Works
When users attempt to access Iru Endpoint, they’re redirected to Microsoft Entra ID for authentication using OAuth2/OpenID Connect protocols. After successful authentication, Microsoft Entra ID sends an access token back to Iru Endpoint, which validates the user’s identity and grants access to the platform.
Note: Microsoft Entra ID is the new name for Azure AD (Azure Active Directory)
Because client secrets have a maximum life of 24 months, we recommend that you configure SAML based Single Sign-On instead of using the method described in this document.
Setting Up Microsoft Entra ID Application
Access Microsoft Entra Admin Center
Navigate to Applications
In the left navigation bar, click Applications.
Access App Registrations
Click App Registrations.
Create New Registration
Click New Registration to register a new application.
Name the Application
In the Name field, specify a name for the application (such as “Iru Endpoint Native SSO”).
Select Account Types
For “Supported account types,” select Accounts in this organizational directory only.
Configure Redirect URI
In the Redirect URI field, select Web from the dropdown menu, and enter one of the following values, depending on where your Iru Endpoint tenant is hosted.
-
If your tenant is hosted in the US, use the following URI:
https://auth.kandji.io/login/callback
-
If your tenant is hosted in the EU, use the following URI:
https://auth.eu.kandji.io/login/callback
Register Application
Click Register.
Copy Client ID
On the new page, copy the Client ID and save this for later.
Access Certificates and Secrets
Click Certificates and Secrets.
Create New Client Secret
Click “New client secret.”
Configure Secret Details
Give the client secret a name such as “Iru Endpoint Native SSO.”
Set Expiration
Set the expiration to 24 months.
Copy Secret Value
Copy the Value of the client secret, and save this for later. Note that the client secret Value is distinct from the client secret ID.
Configuring Iru Endpoint Connection
Navigate to Settings
Navigate to the Settings page.
Access Authentication Settings
Click the Access tab.
Add New Connection
Find the Authentication section and click the Add button at the bottom left of the authentication section.
Select Microsoft Entra ID
In the new blade, click on the Microsoft Entra ID connection option.
Continue Setup
Click Next.
Configure Connection Name
Customize or use the default Name for the Entra connection (this will be shown on the login page).
Enter Client ID
Enter the Client ID you previously copied from the Entra admin center.
Enter Client Secret
Enter the Client Secret you previously copied from the Entra admin center.
Save Configuration
Click Save.
Authorize Connection
After saving, a new dialogue box will appear with a link to authorize your connection. A Microsoft Entra ID administrator for your domain will need to click the link and complete this process to authorize the application. This box will not go away after authorization is completed.
Complete Authorization
In the new window that launches, sign in and click accept.
Verify Authorization
After clicking Accept, you will be brought to an authorization success page.
Confirm Setup
Your connection has now been successfully configured and may be enabled and tested.
If you encounter the error “Failed to obtain access token,” it may be because the secret ID was used instead of the correct value.
Enabling the Connection
Once you have configured the connection in Iru Endpoint and your identity provider, you can enable it. For step-by-step instructions, please refer to our Single Sign-On support article.
Enforcing Single Sign-On
Once you have configured at least one Single Sign-On connection, you can disable the Standard Authentication connection. Disabling Iru Endpoint standard authentication will disable the ability for Iru Endpoint administrators in your tenant to authentication via Email/Password, Google Sign in, or Office 365 Sign in. Please refer to our Single Sign-On support article for step-by-step instructions.
Renewing the Client Secret
Navigate to Settings
In the Iru Endpoint web app, navigate to the Settings page.
Access Authentication Settings
Click the Access tab.
Find Authentication Section
Find the Authentication section.
Configure SSO Integration
Click on the ellipsis next to the SSO integration that was created earlier in this article, and choose Configure.
Update Client Secret
Replace the Client Secret with the client secret value that was copied earlier.
Test Configuration
Be sure to test the configuration by signing into the Iru Endpoint web app and choosing the Native SSO login option that was created. You’ll want to test this with a private browser window/incognito window and verify that you are able to sign in to the Iru Endpoint web app.
Clean Up Old Secret
You can then optionally delete the previous client secret from the App registration in Entra ID.
Considerations
Security: Ensure that your Microsoft Entra ID tenant has appropriate security policies configured for OAuth2/OpenID Connect authentication.
Client Secret Management: Client secrets expire after 24 months and must be renewed regularly. Consider using SAML-based SSO for longer-term solutions.
Testing: Always test the SSO integration with a small group of users before rolling out to your entire organization.
User Management: Users must exist in both Microsoft Entra ID and Iru Endpoint to successfully authenticate via SSO.