Skip to content

Configure Microsoft Entra applications for external user integration in Aero

Aero lets you synchronize and authenticate users with external services like Microsoft Entra. To set this up, you'll need to configure both Aero and Entra. Start by logging into your Microsoft Entra tenant.

Add and configure an application for user synchronisation

First, you will need to add an application that allows Aero to synchronize users. To do this, follow these steps:

  1. On the Entra overview page, click App registrations in the side bar.
  2. Click New registration.

    App registrations menu item

  3. Enter a Name and click Register.

    New registration

  4. Click View API permissions.

    Synchronization application overview

  5. Click Add a permission.

    Synchronization application permissions overview

  6. Click Microsoft Graph.

    Add permissions

  7. Click Application permissions.

    Add MS Graph permissions

  8. Scroll down to Group and User (or use the search bar), and check the following permissions

    1. User.Read.All
    2. Group.Read.All
  9. Click Add permissions.

    Application permissions User

    Application permissions Group

  10. In the overview, click Add permissions again.

  11. Click Microsoft Graph, and click Delegated permissions.
  12. Under OpenID permissions check the following permissions:
    1. email (View users' email address)
    2. profile (View users' basic profile)
  13. Click Add permissions

    Delegated permissions OpenID

  14. In the overview, click Grant admin consent for 'tenant name'.

    Grant admin consent

  15. In the popup, click Yes.

    Consent confirmation

  16. The status of the permissions is now changed to Granted.

    Permissions granted

  17. In the sidebar, under Manage, click Certificates & secrets.

    Application sidebar

  18. Click the tab Client secrets (#) and click + New client secret.

    Client secret overview

  19. Enter a Description for the secret,and select an expiration under Expires.

  20. Click Add.

    Add client secret

  21. The secret is created. Copy the Value, you will need this in your Aero configuration. Note: the value can only be copied after creating the secret. Once you leave the page, you will no longer be able to copy it.

    Client secret overview

  22. In the sidebar, under Manage, click Authentication.

  23. Click Add a platform.

    Authentication overview

  24. Click Single-page application.

    Add redirect URI

  25. Under Redirect URIs, enter https://app.metacomplatform.com/login.

  26. Under Front-channel logout URL, enter https://app.metacomplatform.com/logout.
  27. Click Configure.

    Configure redirect URI

  28. To allow users to also log in on their mobile apps, you need to add another URI. On the overview page, click Add a platform again.

    Authentication overview

  29. Under Mobile and desktop applications, click Mobile and desktop applications.

    Add redirect URI

  30. Under Custom redirect URIs enter com.bizzstream://oauth/redirect/.

  31. Click Configure.

    Add redirect URI for mobile

  32. In the left-hand sidebar, click Manifest.

  33. In the api-object, ensure requestedAccessTokenVersion has value 2.

    Set correct requestedAccessTokenVersion

Synchronize Users from Entra to Aero

Now that you can synchronize users from Entra to Aero, you can create a second application. This application will allow users to authenticate (i.e. log in) with Aero using Aero. To create an authentication application, follow these steps:

  1. On the Entra overview page, click App registrations in the side bar.
  2. Click New registration.

    App registrations menu item

  3. Enter a Name.

  4. Check Accounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant).
  5. Under Redirect URI (Optional), select Single-page application (SPA) and enter https://app.metacomplatform.com/login.
  6. Click Register.

    New registration

  7. Click View API permissions.

    Authentication application overview

  8. Click Add a permission.

    Synchronization application permissions overview

  9. Click Microsoft Graph.

    Add permissions

  10. Click Delegated permissions.

    Add MS Graph permissions

  11. Under OpenID permissions select openid and profile.

    Add OpenID permissions

  12. Under User select User.Read.All and User.ReadWrite.All and click Add Permissions.

    Add MS Graph permissions

  13. In the overview, click Grant admin consent for 'tenant name'.

  14. In the popup, click Yes.
  15. The status of the permissions is now changed to Granted.

    Permissions granted

  16. In the sidebar, click Authentication.

  17. Check Access tokens (used for implicit flows) and ID tokens (used for implicit and hybrid flows).
  18. Click Save.

    Permissions granted

You have now configured an app registration you can use to integrate with BizzStream Aero.

Create a Directory Service in Aero

Now that you have finished the configuration of applications in Entra, you can create a Directory Service in Aero, and connect it to your Entra applications.