Link Search Menu Expand Document

Table of contents

  1. TIKTING – Microsoft Entra ID (Azure AD) SSO Integration Guide
    1. 1. Prerequisites
    2. 2. Open Azure Portal
    3. 3. Create an App Registration
    4. 4. Record Application Details
    5. 5. Add Redirect URIs and Logout URLs
    6. 6. Create a Client Secret
    7. 7. Configure Required API Permissions
      1. 7.1 Go to API permissionsAdd a permission
      2. Delegated Permissions
      3. Application Permissions (mandatory for directory lookup)
      4. 7.2 Grant Admin Consent
    8. 8. Assign (Optional But Recommended) Directory Role
    9. 9. Configure Microsoft Entra SSO in TIKTING
    10. 10. Test Microsoft Login
    11. 11. User Rollout
    12. Support

TIKTING – Microsoft Entra ID (Azure AD) SSO Integration Guide

TIKTING supports secure authentication using Microsoft Entra ID (formerly Azure Active Directory).
This guide explains how to create an Entra App Registration, configure API permissions, create a client secret, assign directory roles, and integrate with TIKTING.


1. Prerequisites

To enable Microsoft Entra SSO, ensure you have:

  • An active Microsoft 365 / Entra ID tenant
  • Global Administrator or Application Administrator permissions
  • Access to the Azure Portal

If your organization does not yet use Microsoft Entra ID, you can register here:
https://azure.microsoft.com


2. Open Azure Portal

Navigate to:

https://portal.azure.com

Sign in using your administrator account.


3. Create an App Registration

  1. Go to Microsoft Entra ID
  2. Select App registrations
  3. Click New registration
  4. Fill the details:
    • Name: TIKTING-SSO
    • Supported account types: Accounts in this organizational directory only
    • Redirect URI (Web):
      https://your-tikting-domain.com/auth/azure/callback
      
  5. Click Register


4. Record Application Details

After registration, copy the following values:

  • Application (client) ID
  • Directory (tenant) ID

These will be entered into TIKTING later.

Screenshot Placeholder:
![App Overview](images/app-overview.png)


5. Add Redirect URIs and Logout URLs

  1. Go to Authentication
  2. Under Redirect URIs, add:

https://your-tikting-domain.com/auth/azure/callback http://localhost:5173/auth/azure/callback (Optional for local development)

  1. Enable the following:
    • ID tokens (required for implicit and hybrid flows)
  2. Save

Screenshot Placeholder:
![Authentication Settings](images/auth-settings.png)


6. Create a Client Secret

  1. Go to Certificates & secrets
  2. Select New client secret
  3. Add description: tikting-sso-secret
  4. Choose expiry (recommended: 24 months)
  5. Click Add
  6. Copy the Value immediately (it won’t be shown again)

Fields required by TIKTING:

  • Client Secret Value
  • Secret ID (optional for logs)

Screenshot Placeholder:
![Client Secret](images/client-secret.png)


7. Configure Required API Permissions

TIKTING requires access to basic profile and directory data to validate users.

7.1 Go to API permissionsAdd a permission

Add the following Microsoft Graph permissions:

Delegated Permissions

  • openid
  • email
  • profile
  • User.Read

Application Permissions (mandatory for directory lookup)

  • User.Read.All
  • Directory.Read.All

Click:

**Grant admin consent for **

Permissions will show a green checkmark once approved.

Screenshot Placeholder:
![API Permissions](images/api-permissions.png)


If you want tighter security, assign the app a limited directory role:

  1. Go to Microsoft Entra ID → Roles and administrators
  2. Assign the app:
    • Directory Readers

This provides safer read-only access for validating users.

Screenshot Placeholder:
![Assign Directory Role](images/directory-role.png)


9. Configure Microsoft Entra SSO in TIKTING

In the TIKTING Admin Portal:

  1. Navigate to:

Settings → Authentication & SSO → Microsoft Entra ID (Azure AD)

  1. Enter the following values:
  • Tenant ID
  • Client ID
  • Client Secret
  • Directory Permissions Scope (default)
  1. Save settings
  2. Enable the Microsoft Login toggle

Screenshot Placeholder:
![TIKTING Microsoft SSO Settings](images/tikting-azure-settings.png)


10. Test Microsoft Login

  1. Open your TIKTING login page
  2. Click Sign in with Microsoft
  3. Authenticate using a Microsoft 365 user
  4. Confirm login flow completes successfully

Screenshot Placeholder:
![Microsoft Login Button](images/azure-login-button.png)


11. User Rollout

Provide the final login URL to your staff:

https://your-tikting-domain.com/app/login

Users can now log in using their Microsoft 365 accounts.


Support

If you require help during setup, contact ITDEVTECH support or your assigned TIKTING onboarding engineer.