Entra ID Configuration
Configuring Entra ID SSO for Protegrity Browser Protector.
Configuring Entra ID Single Sign-On (SSO) for Protegrity Browser Protector
To enable SSO using Microsoft Entra ID, formerly Azure AD, for the Protegrity Browser Protector extension, follow the steps below.
Create a New App Registration
- Log in to the Microsoft Entra Admin Center.
- Navigate to App registrations > New registration.
- Provide the following details for the new app:
- Name: Enter a name for the app, for example,
Protegrity Browser Protector. - Supported account types: Choose the account type suitable for your organization. For example, accounts in this organizational directory only.
- Redirect URI: Leave this blank for now; you will configure it in a later step.
- Name: Enter a name for the app, for example,
- Click Register to create the app registration.
- After registration, copy the app_registration_client_id and app_registration_tenant_id displayed on the app overview page. You’ll need these IDs for configuration in Set Up Configuration File for Browser Protector.
Add Redirect URI for Single-Page Application
- Log in to the Microsoft Entra Admin Center.
- In the app registration overview, navigate to the Authentication tab.
- Under Platform configurations, click Add a platform.
- Select Single-page application from the list.
- Add a new Redirect URI with the following format:
- Format:
https://pty_extension_id.chromiumapp.org - Example:
https://epfnbngoodhmbeepjlcohfacgnbhbhah.chromiumapp.org/ - Replace
pty_extension_idwith extension id recorded inExtension Sourcesection.
- Format:
- Scroll down and set the Logout URL to the same URI:
- Example:
https://epfnbngoodhmbeepjlcohfacgnbhbhah.chromiumapp.org/
- Example:
- Click Save to apply the changes.
Finalize Authentication Settings
- In the Microsoft Entra Admin Center, ensure that:
- Access tokens and ID tokens are enabled in the Implicit grant and hybrid flows section.
- Redirect URIs are correctly configured.
- Save the changes.
Feedback
Was this page helpful?