Skip to main contentPoolside utilizes OIDC for user authentication and access entitlement. The OIDC configuration needs to be configured when bringing up your Poolside deployment.
Microsoft Entra ID
Binding Poolside to Entra ID requires the creation of an Application in Entra ID that can be configured to provide access to users inside your directory.
To create an application:
- Sign in to the Microsoft Entra admin center.
- Browse to
Identity > Applications > App registrations.
- Select
New registration to begin the creation of an application for Poolside
- Provide a name for the application, for example,
Poolside.
- Select the desired supporting account types that can access the application based on your needs.
- Configure a redirect URI to your Poolside deployment, using
Web for the platform and the URI set to https://<your-poolside-deployment-DNS-name>/auth/callback substituting your specific deployment DNS name.
- On the created application, navigate to
Authentication and select both options for Access tokens and ID tokens under the Implicit grant hybrid flows options. 
- On the created application, navigate to
Manage > Certificates & secrets.
- Create a new secret provide a description that is meaningful and then select an expiry of 365 days.
- Obtain the necessary details for the application to be able to bind Poolside via OIDC:
- The secret value from the secret just created (make sure you take a copy of this before navigating away from the page) which is our
Client secret value.
- Application (client) ID from the Overview page which is our
Client ID value.
- The OIDC endpoint from the
Endpoints button on the Overview page, by selecting the OpenID Connect metadata document URL, opening it and extracting the issuer URL value.