Configuration
After completing the Microsoft Entra ID setup, configure the extension in TYPO3 with the credentials obtained from Azure.
Backend module (recommended)
The recommended way to configure Azure credentials is via the dedicated backend module. This allows you to manage credentials per TYPO3 site, so each site can use its own Azure app registration.
-
Open the backend module
In the TYPO3 backend, navigate to Web > Azure Login.
-
Select a page in the page tree
Click on any page that belongs to the site you want to configure. The module automatically resolves the site root page from the TYPO3 Site Configuration.
-
Fill in the credentials
The form displays the following fields:
Tenant ID
-
- type
-
string
The Directory (tenant) ID from your Microsoft Entra ID app registration.
Client ID
-
- type
-
string
The Application (client) ID from your Microsoft Entra ID app registration.
Client Secret
-
- type
-
string (password)
The Client Secret Value from your Microsoft Entra ID app registration.
Attention
This is the secret Value, not the Secret ID.
The secret is encrypted using PHP Sodium before being stored in the database. It is never displayed in the form after saving. If a secret is already stored, a green indicator is shown. Leave the field empty to keep the existing secret, or enter a new value to replace it.
Redirect URI (Frontend)
-
- type
-
string (URL)
The OAuth callback URL for frontend login. This must match one of the redirect URIs registered in your Azure app.
Example:
https://your-domain.com/your-login-page
Redirect URI (Backend)
-
- type
-
read-only (auto-generated)
The OAuth callback URL for backend login, automatically derived from the registered backend route. This field is read-only and shown with a copy button. Register this URL as a redirect URI in your Azure app.
Example:
https://your-domain.com/typo3/azure-login/callbackNote
This URL is generated from the route configuration in
Configuration/Backend/Routes.phpand cannot be changed manually.
-
Save
Click the save button in the document header. A success message confirms the configuration has been saved.
Important
The backend module requires admin access. It is only available to TYPO3 administrators.
Encryption
Client secrets are encrypted at rest using PHP Sodium authenticated encryption
(sodium_crypto_secretbox). The encryption key is derived from TYPO3's
$GLOBALS['TYPO3_CONF_VARS']['SYS']['encryptionKey'].
Warning
If the TYPO3 encryption key is not set, the backend module displays a warning and secrets cannot be encrypted. Configure the encryption key in the Install Tool before saving credentials.
If the encryption key changes after secrets have been saved, previously encrypted secrets become unreadable and must be re-entered.
Extension settings (fallback)
As a fallback, global credentials can be configured via Extension Configuration in the TYPO3 backend (Admin Tools > Settings > Extension Configuration > ok_azure_login).
These global settings are used when no per-site database configuration exists for the current site. This is useful for simple single-site installations or as a migration path from older versions of the extension.
The following settings are available:
tenantId
-
- type
-
string
- Default
-
(empty)
The Directory (tenant) ID from your Microsoft Entra ID app registration.
clientId
-
- type
-
string
- Default
-
(empty)
The Application (client) ID from your Microsoft Entra ID app registration.
clientSecret
-
- type
-
string
- Default
-
(empty)
The Client Secret Value from your Microsoft Entra ID app registration.
Attention
This is the secret Value, not the Secret ID. Note that secrets stored via Extension Configuration are not encrypted.
redirectUriFrontend
-
- type
-
string
- Default
-
(empty)
The OAuth callback URL for frontend login.
Example:
https://your-domain.com/your-login-page
redirectUriBackend
-
- type
-
string
- Default
-
(empty)
Deprecated. The backend redirect URI is now automatically derived from the registered backend route (
/typo3/azure-login/callback). This setting is ignored when using database configuration. It may still be used as a fallback in Extension Configuration for legacy setups.
Configuration resolution order
The extension resolves Azure credentials in the following order:
- Database configuration for the current site root page (from the backend module)
- Extension Configuration (global fallback from
ext_conf_template.txt)
If a database record exists for the site but has an empty Tenant ID, it is treated as unconfigured and the extension falls back to Extension Configuration.
TypoScript configuration
The extension registers a static TypoScript template Azure Login that configures the Fluid template paths. Include it via the Template module (see Installation).
You can override the template paths via TypoScript constants:
plugin.tx_okazurelogin_login {
view {
templateRootPath = EXT:your_sitepackage/Resources/Private/Extensions/OkAzureLogin/Templates/
partialRootPath = EXT:your_sitepackage/Resources/Private/Extensions/OkAzureLogin/Partials/
layoutRootPath = EXT:your_sitepackage/Resources/Private/Extensions/OkAzureLogin/Layouts/
}
}
Content element settings
- Azure Login (frontend login)
- Button Theme
- Choose between a dark or light Microsoft button style.
- Azure Logout (frontend logout)
- Button Theme
- Choose between a dark or light Microsoft button style.
- Microsoft Sign-Out
- When enabled, the user is redirected to the Microsoft logout endpoint to sign them out of Microsoft as well as TYPO3.
- Redirect URL
- Custom URL to redirect to after logout. Defaults to the site root.
How it works
The authentication flow is handled entirely by the extension:
- The content element renders a "Sign in with Microsoft" button linking to the Microsoft Entra ID authorization endpoint.
- The user authenticates at Microsoft and is redirected back with an authorization code.
- A PSR-15 middleware intercepts the callback, exchanges the code for user information via the Microsoft Graph API, and injects the user data into the TYPO3 authentication chain.
- The TYPO3 authentication service looks up the user by email in the
appropriate user table (
fe_usersorbe_users). - If a matching, non-disabled user is found, they are logged in and redirected to the return URL.
Important
The extension does not create new user accounts. A matching
fe_users or be_users record with the same email address must
already exist in TYPO3.
Security notes
- Encrypted secrets: Client secrets stored via the backend module are
encrypted at rest using PHP Sodium (
sodium_crypto_secretbox). The encryption key is derived from TYPO3'sencryptionKey. - HMAC-signed state: The OAuth state parameter is HMAC-signed using TYPO3's
encryptionKeyand has a 10-minute TTL to prevent CSRF and replay attacks. - Per-site isolation: Each TYPO3 site can have its own Azure credentials, preventing credential leakage across multi-site installations.
- Never commit client secrets to version control.
- Use separate Azure app registrations for development, staging, and production environments.
- Rotate client secrets regularly before their expiration date.