Microsoft Azure
You can connect your Microsoft Azure Tenant as an Auth Provider for Seatsurfing.
1. Configure your Azure Tenant
- Log in to the Microsoft Azure Portal.
- Navigate to "App registrations".
- Create a new registration. Select supported account type "Accounts in this organizational directory only (<YOUR TENANT> only - Single tenant)" to restrict login access to users within your tenant only.
- Copy the Application (client) ID.
- Navigate to "Certificates & secrets", create a new Client secret and copy the Secret Value (not the ID).
- Navigate to "API permissions", click "Add permission", choose "Microsoft Graph", select "Delegated permissions". Then search and add the required permissions:
email
User.Read
2. Configure Seatsurfing
- Log in to Seatsurfing's Administrator UI.
- Navigate to Settings and add a new Auth Provider.
- Select the Microsoft template.
- Paste the Application (client) ID into the "Client ID" field.
- Paste the Secret Value into the "Client Secret" field.
- Replace the path
/common/
in "Auth URL", "Token URL", and "Logout URL" with/<YOUR TENANT'S NAME OR ID>/
. Skip this step, if the account type in Step 1 was set to "Accounts in any organizational directory". - Save the Auth Provider.
- Copy the "Callback URL" which is displayed right after saving.
3. Finish Azure Configuration
- Head back to the App Registration you've created in the Azure Portal in Step 1.
- Navigate to "Authentication" and add a new "Platform configuration" (type "Web application > Web") and use the "Callback URL" from Step 2 as a "Redirect URI" (i.e.
https://<YOUR SEATSURFING DOMAIN>/auth/xyz/callback
).