Login to Kublr with Microsoft Entra ID Credentials

Login to Kublr with Microsoft Entra ID Credentials

Keycloak provides a feature to enable login with various identity providers, including Microsoft Entra ID (previously known as Azure Active Directory, Azure AD). Here are the steps to configure Keycloak to allow login with an account from Microsoft Entra ID.



  1. Access https://<kublr-url>/auth.

    The Keycloak login page is displayed.

  2. Login into Keycloak using admin login and password.

  3. Get the Keycloak URL from the address bar. This should be something like:


In Microsoft Entra ID:

  1. Login to the Azure portal and go to Entra ID.

  2. Select App Registrations and then click New Registration.

  3. Provide a name for your application.

  4. Select the supported account type.

  5. In the Redirect URI section, select Web and input the Keycloak URL.

    Entra ID - adding application

  6. Click Register. The application is created, and its page is displayed.

  7. Copy and save the Application (client) ID and the Directory (tenant) ID.

  8. Go to Certificates & secrets.

  9. In the Client Secrets section, click New Client Secret.

  10. Add a description, select an expiration period, and then click Add.

  11. Copy the client secret value.

In Kublr’s Keycloak:

  1. Access your Kublr’s Keycloak https://<kublr-url>/auth as described in “Prerequisites”.

  2. Select the kublr-ui realm to add Azure AD as an identity provider.

  3. Go to Identity Providers and click Microsoft. The Add Microsoft provider dialog is displayed.

  4. In the Add Microsoft provider dialog, set:

    • Client ID to previously saved Application (client) ID.
    • Client Secret to the previously saved value of the client secret.

    The Redirect URI will be automatically filled and should match the one you set in Azure.

    Keycloak - adding Microsoft provider

  5. Click Add. Now you can log in to the Kublr via Microsoft.

See also