Azure AD (Microsoft Entra ID)
Configure SSO with Azure AD / Microsoft Entra ID (OIDC or SAML)
1. Register an application in Azure
- Log in to the Azure Portal.
- Go to Microsoft Entra ID (or Azure Active Directory) → App registrations → New registration.
- Enter a Name (e.g. Dokploy), choose supported account types, and set Redirect URI to Web with a placeholder for now (e.g.
https://your-dokploy-domain.com/api/auth/callback/myorg-name-azure). - Register and note the Application (client) ID and Directory (tenant) ID.
- Go to Certificates & secrets → New client secret, create a secret and note its Value (you won’t see it again).
- The Issuer URL for OpenID Connect is:
https://login.microsoftonline.com/{tenant-id}/v2.0(replace{tenant-id}with your Directory (tenant) ID). Some setups expect a trailing slash.
2. Configure Dokploy
- In Dokploy, go to Settings (or Organization / Security in Enterprise).
- Enable SSO and choose OpenID Connect.
- Enter:
- Provider: myorg-name-azure (unique name for this provider)
- Issuer URL:
https://login.microsoftonline.com/YOUR_TENANT_ID/v2.0(use your Directory (tenant) ID; add a trailing slash if required for discovery) - Domain: the domain users use to authenticate via Azure AD (e.g. your organization domain like
acme.com), not the Dokploy instance URL - Client ID: the Application (client) ID from Azure
- Client Secret: the client secret value from Certificates & secrets
- Scopes: openid email profile
- Save.
3. Configure Azure
- In your app registration, go to Authentication.
- Under Web → Redirect URIs, add:
https://your-dokploy-domain.com/api/auth/callback/myorg-name-azure
- Under Front-channel logout URL (optional), you can set:
https://your-dokploy-domain.com
- Go to Token Configuration and add optional claim, select email, preferred_username and upn from the list of claims.
- Save.
Troubleshooting (OIDC)
- Redirect URI mismatch — Ensure the callback URL in Dokploy matches exactly what is configured in Azure (including protocol and path). Use the same Provider value in the path (e.g.
.../api/auth/callback/myorg-name-azure). - Invalid client — Double-check Application (client) ID and client secret. Confirm the secret has not expired under Certificates & secrets.
- Tenant — Use the correct Directory (tenant) ID in the Issuer URL. For multi-tenant apps, you may use
commoninstead of the tenant ID (e.g.https://login.microsoftonline.com/common/v2.0). - Scopes — Ensure the app registration has the right API permissions (e.g. OpenID permissions, User.Read) if required for
openid,email, andprofile.
1. Create an Enterprise Application (SAML) in Azure
- Log in to the Azure Portal.
- Go to Microsoft Entra ID → Enterprise applications → New application → Create your own application (or Non-gallery application).
- Enter a Name (e.g. Dokploy) and create.
- Go to Single sign-on → SAML.
- Note the Identifier (Entity ID) and Login URL (SSO URL). Under SAML Certificates, download or copy the Certificate (Base64) (x509) and download the Federation Metadata XML file.
2. Configure Dokploy
- In Dokploy, go to Settings (or Organization / Security in Enterprise).
- Enable SSO and choose SAML.
- Enter:
- Provider: myorg-name-azure-saml (unique name for this provider)
- Issuer URL: the Azure SAML Entity ID (Identifier) from the Enterprise application (eg.
https://sts.windows.net/YOUR_TENANT_ID/). - SSO URL: the Azure Login URL (Single Sign-On URL) (eg.
https://login.microsoftonline.com/YOUR_TENANT_ID/saml2) - Certificate: the IdP signing certificate (x509 Base64) from Azure
- Federation Metadata XML: the Federation Metadata XML file from Azure
- Domain: the domain users use to authenticate via Azure AD (e.g. your organization domain like
acme.com), not the Dokploy instance URL
- Save.
3. Configure Azure (SAML)
- In your Enterprise application, go to Single sign-on → SAML.
- Under Basic SAML Configuration, set Identifier (Entity ID) if required (SP Entity ID from Dokploy) (eg.
https://your-dokploy-instance.com). - Set Reply URL (Assertion Consumer Service URL) to your Dokploy SAML ACS URL (eg.
https://your-dokploy-instance.com/api/auth/sso/saml2/callback/myorg-name-azure-saml). - Save.
Troubleshooting (SAML)
- ACS URL mismatch — Ensure the Reply URL (ACS) in Azure matches exactly what Dokploy provides (including protocol and path).
- Certificate — Use the Certificate (Base64) from Azure; paste as-is or convert to PEM if Dokploy expects PEM.
- Entity ID — The Entity ID in Dokploy must match the Identifier (Entity ID) of the Azure Enterprise application.
For help with your setup, contact us.