Skip to main content
Poolside utilizes OIDC for user authentication and access entitlement. The OIDC configuration needs to be configured when bringing up your Poolside deployment.

Microsoft Entra ID

Binding Poolside to Entra ID requires the creation of an Application in Entra ID that can be configured to provide access to users inside your directory. To create an application:
  1. Sign in to the Microsoft Entra admin center.
  2. Browse to Identity > Applications > App registrations.
  3. Select New registration to begin the creation of an application for Poolside
  4. Provide a name for the application, for example, Poolside.
  5. Select the desired supporting account types that can access the application based on your needs.
  6. Configure a redirect URI to your Poolside deployment, using Web for the platform and the URI set to https://<your-poolside-deployment-DNS-name>/auth/callback substituting your specific deployment DNS name. App registration
  7. On the created application, navigate to Authentication and select both options for Access tokens and ID tokens under the Implicit grant hybrid flows options. Application token
  8. On the created application, navigate to Manage > Certificates & secrets.
  9. Create a new secret provide a description that is meaningful and then select an expiry of 365 days. Application secret
  10. Obtain the necessary details for the application to be able to bind Poolside via OIDC:
    • The secret value from the secret just created (make sure you take a copy of this before navigating away from the page) which is our Client secret value.
    • Application (client) ID from the Overview page which is our Client ID value.
    • The OIDC endpoint from the Endpoints button on the Overview page, by selecting the OpenID Connect metadata document URL, opening it and extracting the issuer URL value.