How to Integrate Vultr Single Sign-On with Microsoft Entra ID

Updated on November 15, 2024

Single sign-on (SSO) is a service that lets you authenticate to multiple websites and applications using one set of login credentials. SSO eliminates the need for multiple logins, hence providing a better user experience. Vultr SSO integrates well with Microsoft Entra ID, a cloud-based identity and access management service.

Follow this guide to integrate Vultr SSO with Microsoft Entra ID using the Vultr Customer Portal.

Set up Microsoft Entra ID Integration

Create a Microsoft Entra ID Account User

  1. Log in to your Microsoft Azure account.

  2. Select Microsoft Entra ID under Azure Services.

    Azure Services

  3. Click Users under Manage.

    Azure Users Menu

  4. Click New user.

    Azure Users Menu

  5. Enter the user details. Then, auto-generate and copy the user's password. Then, click Review + create.

    Enter Azure User's Details

  6. Review the user's details and click Create. Copy the User principal name. You'll use the value as an email address to set up a new Vultr SSO user.

    Confirm Azure Users Details

Create a Microsoft Entra ID Application

  1. Select App registrations under Manage.

    Azure App Registration Menu

  2. Click New registrations.

    Azure App Registration Menu

  3. Name your App, for instance, Vultr SSO. Then, select Web in the drop-down box set the Redirect URI to https://my.vultr.com/openid/, and click Register.

    Register Azure App

  4. Navigate to Manage and select API permissions in the new App page. Then, click Add a permission.

    Azure API Permissions

  5. Click Microsoft Graph.

    Azure Microsoft Graph

  6. Click Delegated permissions.

    Azure Delegated Permissions

  7. Search and set the following permissions in the search box.

    • Directory: Set Directory.Read.All permissions.

      Azure Directory Permissions

    • Group: Set Group.Read.All permissions.

      Azure Group Permissions

    • User: Set User.Read permissions.

      Azure User Permissions

    • email: Set email permissions.

      Azure email Permissions

    • offline_access: Set offline_access permissions.

      Azure Offline Access Permissions

    • openid: Set openid permissions.

      Azure OpenID Permissions

    • profile: Set profile permissions and click Add permissions to save all the permissions.

      Azure Profile Permissions

  8. Click Grant admin consent for Default Directory.

    Grant Admin Conscent

  9. Navigate to Certificates & secrets and click New client secret.

    Azure Certificates & secrets

  10. Name the client secret. For instance, Vultr SSO Secret, set the expiry, and click Add.

    Azure Client Secret Details

  11. Copy the Azure client secret value to your clipboard because the Azure Portal won't display the value again.

    Azure Client Secret Value

  12. Navigate to Overview and copy the Application (client) ID and Directory (tenant) ID.

    Azure Client and Directory IDs

Set up Vultr Single Sign-On

  1. Navigate to Account and select Users under OTHER.

  2. Click Begin Setup under Single Sign-On.

    Single Sign-on Setup

  3. Enter Microsoft Entra ID Credentials and specify https://login.microsoftonline.com/directory-tenant-id (For example, https://login.microsoftonline.com/963-542b-48b-8e75-1a) as the OpenID Provider URL. Then, click Enable SSO.

    Microsoft Entra ID Credentials

    1. Click Add New User to create a new user account.

    Add SSO User

  4. Enter the user details, including the name and email. Then, customize the user permissions and click Add User.

    Enter the User Details

  5. Use your Microsoft Entra ID user account to log in to Vultr through the Vultr SSO Login page.