Skip to main content
All CollectionsIntegrationsAdding an Integration
SSO: Configuring for Microsoft Azure / Entra
SSO: Configuring for Microsoft Azure / Entra
Caitlin O'Brien avatar
Written by Caitlin O'Brien
Updated over 3 weeks ago

Scorebuddy allows users to log in to the system using their Single-Sign-on login. You can achieve this by using Microsoft Azure / Entra or OKTA methods. This article aims to provide detailed steps on how to set up the Secure Single Sign-on using Azure.

Installation Set-Up


To use Entra ID (formerly known as Azure AD) for Single Sign-On (SSO) on Scorebuddy, you’ll need to set up SSO integration between your Scorebuddy account and Entra ID. Here’s a general process for doing that:

1. Prepare in Scorebuddy:

  • Admin Access: Make sure you have admin privileges in Scorebuddy to configure SSO settings.

  • SSO Configuration Information: Gather the necessary details like SSO URL and Entity ID from Scorebuddy, as you'll need these to configure Entra ID. You may need to contact Scorebuddy support to enable SSO.

2. Set Up Entra ID for Scorebuddy:

Step 1: Register Your Application in Entra ID

  1. Sign in to Microsoft Entra ID (Azure AD):

  2. Fill in the App Details:

    • Name: Enter a name for your app (e.g., "My OIDC App")

    • Supported account types: Choose who can sign in

      • Single Tenant (Only users in your org)

      • Multi-Tenant (Users from any org)

    • Redirect URI: Select "Web" and enter your callback URL (e.g., https://yourapp.com/auth/callback)

  3. Click "Register"

    • This creates your Client ID (Copy this)


Step 2: Configure Authentication

  1. Go to "Authentication" under your app

  2. Click "Add a platform" → "Web"

    • Enter the Redirect URI (must match the one in Step 1)

    • Enable ID tokens (for OIDC)


Step 3: Generate Client Secret

  1. Go to "Certificates & secrets"

  2. Click "New client secret"

    • Enter a description & expiry

    • Copy the Client Secret (you won’t see it again!)


Step 4: Configure API Permissions

  1. Go to "API permissions"

  2. Click "Add a permission""Microsoft Graph"

  3. Select "Delegated permissions"

    • Add openid, profile, and email

  4. Click "Grant admin consent"

Enter credentials in Scorebuddy:

  • Register the redirect URI’s in Entra/Azure:

  • Add the Login and Logout redirect URIs here, also ensure to select ID tokens as the tokens issues by the auth endpoint:

  • Ensure users are given access to the newly created application:

  • In Scorebuddy, select "Unique Name" for the Claim Identifier to match users between Entra/Azure and Scorebuddy:

  • To log in, select Sign In with Microsoft:

  • Sign into the Microsoft account.

  • Ensure that there is a matching user within the Scorebuddy application for the user to be given access.

Did this answer your question?