Microsoft Entra

Register an application

  • Go to portal.azure.com

  • Select “Microsoft Entra ID” (Previously Azure Active Directory), in the left sidebar select “App registrations”

  • Select “+ New registration”

  • Choose “Accounts in this organizational directory only”

  • For the Redirect Uri choose “Web” and enter the URL: https://docs.mycompany.com/auth/azure.callback

  • Save the new app

  • Make a note of the client id

API permissions

  • Select “API permissions” in the sidebar

  • Click on “Add a permission” and add delegated email , offline_access, and profile permissions from the Microsoft Graph API.

Permissions UI in Azure

Permissions UI in Azure

Certificates and secrets

  • Select “Certificates and secrets” in the left sidebar

  • Select “+ New client secret”, name it something like “wiki” and make a note of the resulting secret value

  • Select “Manifest” in the left sidebar, find the resourceAppId and make a make a note of the value

resourceAppId

resourceAppId

Configure Outline

Add the values noted from the above process in the following environment variables, once you restart the instance you’ll see a new option to sign-in with Microsoft.

Environment variable

AZURE_CLIENT_ID

Enter value from when you registered the application

AZURE_CLIENT_SECRET

Enter value from when you registered the application

AZURE_RESOURCE_APP_ID (optional)

The default value is 00000003-0000-0000-c000-000000000000

AZURE_TENANT_ID (optional)

Adding a tenant ID improves the sign-in experience (How to find)