Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.poolside.ai/llms.txt

Use this file to discover all available pages before exploring further.

Poolside uses OIDC for user authentication and access entitlement. Configure OIDC when bringing up your Poolside deployment.

Microsoft Entra ID

Binding Poolside to Entra ID requires creating an application in Entra ID that provides access to users inside your directory. To create an application:
  1. Sign in to the Microsoft Entra admin center.
  2. Browse to Identity > Applications > App registrations.
  3. Select New registration to begin creating an application for Poolside.
  4. Provide a name for the application, for example, Poolside.
  5. Select the desired supporting account types that can access the application based on your needs.
  6. Configure a redirect URI to your Poolside deployment, using Web for the platform and the URI set to https://<your-poolside-deployment-DNS-name>/auth/callback substituting your specific deployment DNS name.
  1. On the created application, navigate to Authentication and select both options for Access tokens and ID tokens under the Implicit grant and hybrid flows options.
  1. On the created application, navigate to Manage > Certificates & secrets.
  1. Create a new secret, provide a meaningful description, and set the expiry to 365 days.
  1. Obtain the details required to bind Poolside using OIDC:
    • Copy the secret value you created. This is your Client secret. Make sure to copy it before leaving the page.
    • Copy the Application (client) ID from the Overview page. This is your Client ID.
    • From the Overview page, click Endpoints, then open the OpenID Connect metadata document URL. Locate and copy the issuer URL.