Configuration of Microsoft Entra ID (formerly Azure AD) 

This guide walks you through registering an application in Microsoft Entra ID so the extension can authenticate users via the OAuth 2.0 authorization code flow.

  1. Register an application in Microsoft Entra ID

    Go to https://portal.azure.com and navigate to Microsoft Entra ID > App registrations.

  2. Configure the application

    • Name: Choose a descriptive name (e.g. "TYPO3 Azure Login").
    • Supported account types: Select "Accounts in this organizational directory only (Single tenant)".
  3. Add redirect URIs

    Under Redirect URI, select Web and add the callback URLs that match your TYPO3 site:

    • Frontend: https://your-domain.com/your-login-page (the page containing the Azure Login content element)
    • Backend: https://your-domain.com/typo3/azure-login/callback

    Click Register.

  4. Collect Tenant ID and Client ID

    On the Overview page, note down:

    • Directory (tenant) ID -- this is the Tenant ID
    • Application (client) ID -- this is the Client ID
  5. Create a client secret

    • Navigate to Certificates & secrets > Client secrets
    • Click New client secret
    • Enter a description and choose an expiration period
    • Click Add
  6. Configure API permissions

    The extension uses the authorization code flow with delegated permissions (not application permissions). It requests the following scopes:

    • openid -- sign-in
    • profile -- basic user profile
    • User.Read -- read the signed-in user's profile (email, display name)

    To configure:

    • Navigate to API permissions
    • Click Add a permission > Microsoft Graph > Delegated permissions
    • Select: openid, profile, User.Read
    • Click Add permissions
    • Click Grant admin consent for [Your Organization]
  7. Configure in TYPO3

    Enter the collected credentials (Tenant ID, Client ID, Client Secret, redirect URIs) in the TYPO3 backend module at Web > Azure Login.

    See Configuration for details.