Dokploy

Azure AD (Microsoft Entra ID)

Configure SSO with Azure AD / Microsoft Entra ID (OIDC or SAML)

1. Register an application in Azure

  1. Log in to the Azure Portal.
  2. Go to Microsoft Entra ID (or Azure Active Directory) → App registrationsNew registration.
  3. Enter a Name (e.g. Dokploy), choose supported account types, and set Redirect URI to Web with a placeholder for now (e.g. https://your-dokploy-domain.com/api/auth/callback/myorg-name-azure).
  4. Register and note the Application (client) ID and Directory (tenant) ID.
  5. Go to Certificates & secretsNew client secret, create a secret and note its Value (you won’t see it again).
  6. The Issuer URL for OpenID Connect is: https://login.microsoftonline.com/{tenant-id}/v2.0 (replace {tenant-id} with your Directory (tenant) ID). Some setups expect a trailing slash.

2. Configure Dokploy

  1. In Dokploy, go to Settings (or Organization / Security in Enterprise).
  2. Enable SSO and choose OpenID Connect.
  3. Enter:
    • Provider: myorg-name-azure (unique name for this provider)
    • Issuer URL: https://login.microsoftonline.com/YOUR_TENANT_ID/v2.0 (use your Directory (tenant) ID; add a trailing slash if required for discovery)
    • Domain: the domain users use to authenticate via Azure AD (e.g. your organization domain like acme.com), not the Dokploy instance URL
    • Client ID: the Application (client) ID from Azure
    • Client Secret: the client secret value from Certificates & secrets
    • Scopes: openid email profile
  4. Save.

3. Configure Azure

  1. In your app registration, go to Authentication.
  2. Under WebRedirect URIs, add:
    • https://your-dokploy-domain.com/api/auth/callback/myorg-name-azure
  3. Under Front-channel logout URL (optional), you can set:
    • https://your-dokploy-domain.com
  4. Go to Token Configuration and add optional claim, select email, preferred_username and upn from the list of claims.
  5. Save.

Troubleshooting (OIDC)

  • Redirect URI mismatch — Ensure the callback URL in Dokploy matches exactly what is configured in Azure (including protocol and path). Use the same Provider value in the path (e.g. .../api/auth/callback/myorg-name-azure).
  • Invalid client — Double-check Application (client) ID and client secret. Confirm the secret has not expired under Certificates & secrets.
  • Tenant — Use the correct Directory (tenant) ID in the Issuer URL. For multi-tenant apps, you may use common instead of the tenant ID (e.g. https://login.microsoftonline.com/common/v2.0).
  • Scopes — Ensure the app registration has the right API permissions (e.g. OpenID permissions, User.Read) if required for openid, email, and profile.

1. Create an Enterprise Application (SAML) in Azure

  1. Log in to the Azure Portal.
  2. Go to Microsoft Entra IDEnterprise applicationsNew applicationCreate your own application (or Non-gallery application).
  3. Enter a Name (e.g. Dokploy) and create.
  4. Go to Single sign-onSAML.
  5. Note the Identifier (Entity ID) and Login URL (SSO URL). Under SAML Certificates, download or copy the Certificate (Base64) (x509) and download the Federation Metadata XML file.

2. Configure Dokploy

  1. In Dokploy, go to Settings (or Organization / Security in Enterprise).
  2. Enable SSO and choose SAML.
  3. Enter:
    • Provider: myorg-name-azure-saml (unique name for this provider)
    • Issuer URL: the Azure SAML Entity ID (Identifier) from the Enterprise application (eg. https://sts.windows.net/YOUR_TENANT_ID/).
    • SSO URL: the Azure Login URL (Single Sign-On URL) (eg. https://login.microsoftonline.com/YOUR_TENANT_ID/saml2)
    • Certificate: the IdP signing certificate (x509 Base64) from Azure
    • Federation Metadata XML: the Federation Metadata XML file from Azure
    • Domain: the domain users use to authenticate via Azure AD (e.g. your organization domain like acme.com), not the Dokploy instance URL
  4. Save.

3. Configure Azure (SAML)

  1. In your Enterprise application, go to Single sign-onSAML.
  2. Under Basic SAML Configuration, set Identifier (Entity ID) if required (SP Entity ID from Dokploy) (eg. https://your-dokploy-instance.com).
  3. Set Reply URL (Assertion Consumer Service URL) to your Dokploy SAML ACS URL (eg. https://your-dokploy-instance.com/api/auth/sso/saml2/callback/myorg-name-azure-saml).
  4. Save.

Troubleshooting (SAML)

  • ACS URL mismatch — Ensure the Reply URL (ACS) in Azure matches exactly what Dokploy provides (including protocol and path).
  • Certificate — Use the Certificate (Base64) from Azure; paste as-is or convert to PEM if Dokploy expects PEM.
  • Entity ID — The Entity ID in Dokploy must match the Identifier (Entity ID) of the Azure Enterprise application.

For help with your setup, contact us.

On this page