Set up SSO for Azure Entra
- Print
- DarkLight
Set up SSO for Azure Entra
- Print
- DarkLight
Article summary
Did you find this summary helpful?
Thank you for your feedback
This feature is currently in Private Preview.
For more information about getting started, see Manage B2 Cloud Storage at Scale: Enterprise Web Console.
For questions after implementation, contact the Product Team.
You can use SSO independently of SCIM by leveraging just-in-time (JIT) provisioning. If SCIM is not available, you can still enable SSO on its own. When users sign in using SSO, their account attributes are automatically imported into the enterprise web console.
Register a New Application
- Navigate to https://entra.microsoft.com, and sign in.
- In the left navigation menu under Identity, select Applications, then select App registrations.
- Click New registration.
- Enter a meaningful name for your application (for example, Backblaze App).
- In the Supported account types field, select Accounts in this organizational directory only (Backblaze only - Single tenant).
- In the Redirect URI field, select Web and enter https://secure.backblaze.com/api/bz_oauth_sso_callback.
This is where Entra ID sends the authentication response (tokens) after a user signs in. - Click Register.
- On the App registration Overview page, copy and save the Application (client) ID value.
This is your application's public identifier.
Create a Client Secret
- Sign in to your Azure Entra admin center.
- In the left navigation menu under Identity, select Applications, then select App registrations.
- Select your Backblaze SSO application.
- Under Manage, click Certificates & secrets.
- Click New client secret.
- Enter a description, and select an expiration timeframe.
- Click Add.
- In the Value column, copy and save the client secret.You will not be able to retrieve the client secret again after you leave this page. This is your application's confidential credential.
Configure API Permissions
Applications are authorized to call APIs when users or admins grant permissions during the consent process. The app’s permission list should include everything it needs to function.
- Sign in to your Azure Entra admin center.
- In the left navigation menu under Identity, select Applications, then select App registrations.
- Select your Backblaze SSO application.
- Under Manage, click API permissions.
- Click Add a permission.
- Click Microsoft Graph.
- Click Delegated permissions, and select the applicable permission types.
- Click Add permissions.
- Under Overview, click Endpoints.
- Copy and save the OpenID Connect metadata document endpoint that Backblaze will use to communicate with Entra.
Configure SSO in the Backblaze Enterprise Web Console
- Sign in to your Backblaze organization.
- In the left navigation menu under Access Control, select Org Users.
- Select the Identity Provider tab.
- Click Set up SSO, and enter the following values:
- OIDC Issuer: Paste the OpenID Connect metadata document value that you copied in the “Configure API Permissions” task.
- Web Client ID: Paste the Application (client) ID value that you copied in the “Register a New Application” task.
- Web Client Secret: Paste the Client Secret value that you copied in the “Create a Client Secret” task.
- Click Save.
Assign Users to SSO
- Sign in to your Azure Entra admin center.
- In the left navigation menu under Identity, select Applications, then select Enterprise applications.
- Select your Backblaze SSO application.
- Under Manage, click Users and groups.
- Click Add user/group.
- Click Users to open the list of available users.
- Select the user(s) or user group(s) that you want to assign to the Backblaze SSO application.
- Click Select.
- Click Assign.
Was this article helpful?