# Hideez Server as an External Authentication Method for Microsoft Entra ID via OIDC

## **Configure OIDC for Entra ID** <a href="#configure-oidc-for-entra-id" id="configure-oidc-for-entra-id"></a>

{% hint style="info" %}
This guide provides step-by-step instructions to configure **Hideez Identity Cloud** as an **External Authentication Method (EAM)** for **Microsoft Entra ID** using **OIDC (OpenID Connect)**. This setup facilitates seamless external authentication and ensures secure user login through an additional **MFA (Multifactor Authentication)** step.

#### **Important Notes** <a href="#important-notes" id="important-notes"></a>

* **Hideez Server** as an **External Authentication Method (EAM)** does not enable direct login to **Microsoft Entra ID**. It serves solely as an additional **MFA verification method**.
* This functionality is **only supported for standard user accounts**. Using Hideez Identity Cloud as an EAM **is not possible for administrator accounts**.
* To enable this feature, an **Entra ID P1 license** is required.
  {% endhint %}

<figure><img src="/files/ujZjhn2O903H8529IdQR" alt=""><figcaption></figcaption></figure>

{% hint style="success" %}
**Additional Resources**

For further setup guidance, refer to the following articles:

* [**Validating tokens issued by Microsoft Entra ID**](https://learn.microsoft.com/en-us/entra/identity/authentication/concept-authentication-external-method-provider#validating-tokens-issued-by-microsoft-entra-id)
  {% endhint %}

## **Step 1: Register the App in Microsoft Entra** <a href="#step-1-register-the-app-in-microsoft-entra" id="step-1-register-the-app-in-microsoft-entra"></a>

1. Log in to the [**Microsoft Entra Admin Center**](https://entra.microsoft.com/).
2. Navigate to **Identity → Applications → App Registrations**.
3. Click **+ New registration**.

<figure><img src="https://support-cloud.hideez.com/~gitbook/image?url=https%3A%2F%2F1530474135-files.gitbook.io%2F%7E%2Ffiles%2Fv0%2Fb%2Fgitbook-x-prod.appspot.com%2Fo%2Fspaces%252F5ugbBHkpcN7qTDyuUyg8%252Fuploads%252FIybkv1RLzuQpGWc34OkO%252Fimage.png%3Falt%3Dmedia%26token%3Dbb667f68-5f8a-4ec3-a568-2d1100bb98de&#x26;width=768&#x26;dpr=4&#x26;quality=100&#x26;sign=d53d6a65&#x26;sv=2" alt=""><figcaption></figcaption></figure>

4. Define a name for the app.
5. Set **Supported account type** to:
   * *Accounts in any organizational directory (Any Entra ID directory - Multitenant)*.
6. Under the **Redirect URI** section:

* Select **Web platform**.
* Enter: `https://<hideez server name>/connect/authorize`
  * Example: `https://dev.hideez.com/connect/authorize`

7. Click **Register**.

<figure><img src="/files/qly6YfYjdbqKXtU0qEli" alt=""><figcaption></figcaption></figure>

{% hint style="info" %}
After registering, keep the **Application ID** from the **Essentials** section. You'll need it later to configure your EAM in **Hideez Enterprise Server**.
{% endhint %}

<figure><img src="https://support-cloud.hideez.com/~gitbook/image?url=https%3A%2F%2F1530474135-files.gitbook.io%2F%7E%2Ffiles%2Fv0%2Fb%2Fgitbook-x-prod.appspot.com%2Fo%2Fspaces%252F5ugbBHkpcN7qTDyuUyg8%252Fuploads%252FzwQZgKshwnT7aT9Jc9k1%252Fimage.png%3Falt%3Dmedia%26token%3Deb1bf832-ae7a-48ac-b006-e4aef16a817f&#x26;width=768&#x26;dpr=4&#x26;quality=100&#x26;sign=3af6cca3&#x26;sv=2" alt=""><figcaption></figcaption></figure>

## **Step 2: Configure Integration in** Hideez Enterprise Server <a href="#step-2-configure-integration-in-hideez-cloud" id="step-2-configure-integration-in-hideez-cloud"></a>

1. Go to **Hideez Enterprise Server**.
2. Go to **Integrations → OIDC**.
3. Click **Create App Integration** and set the following parameters:

   * **App Type**: Entra ID External Authentication Method (EAM).

   <div><figure><img src="/files/xk4219r6MnMQbuUFOqIK" alt=""><figcaption></figcaption></figure> <figure><img src="/files/TeQVCT3R9DL29V4zhpt8" alt=""><figcaption></figcaption></figure></div>
4. Fill in the following:

   * **Tenant ID**
   * **Application ID**

   <figure><img src="/files/36Tw7BKqLIIwYaEvlv6B" alt=""><figcaption></figcaption></figure>
5. Click **Create**.

{% hint style="info" %}
Keep the tab **Add openid connect client** with values **Client ID**, **Discovery Endpoint**, and **Entra Application ID** ready for the next step.
{% endhint %}

<figure><img src="/files/lrRe4iE3Js8sPVkqXg9N" alt=""><figcaption></figcaption></figure>

## **Step 3: Add External Method in Entra ID** <a href="#step-3-add-external-method-in-entra-id" id="step-3-add-external-method-in-entra-id"></a>

1. Go back to **Microsoft Entra Admin Center**.
2. Navigate to **Protection → Authentication Methods → Policies**.
3. Click **+ Add external method (Preview)**.
4. Set the following parameters:

   * **Name**: The name users will see during Entra ID login when choosing their authentication method.
   * **Client ID**: Paste from the app integration in Hideez Enterprise Server.
   * **Discovery Endpoint**: Paste from the app integration in the Hideez Enterprise Server.
   * **App ID**: Paste from the app integration in Hideez Enterprise Server.

   <figure><img src="/files/JiWNg0deYosKngN5DgKj" alt=""><figcaption></figcaption></figure>
5. Click **Request permission** to grant admin consent for the app to read user information.
6. Click **Enable**.

<figure><img src="https://support-cloud.hideez.com/~gitbook/image?url=https%3A%2F%2Flh7-rt.googleusercontent.com%2Fdocsz%2FAD_4nXeHXypKs5WgDBHxNJqT3ky5SLGVCfTt9SoNnfLk_70KfUJuFqr6RE2fCSIUM55dLbVVVi2JyvJwuyWSr_nvMoSzvcM-dOmwVWtRkPkpaA865HiqioVBas5s_XQ0zdj_6vrqBMj1dg%3Fkey%3Dp_ZBDQL_R90t9eRObuu2fg6i&#x26;width=768&#x26;dpr=4&#x26;quality=100&#x26;sign=113585d9&#x26;sv=2" alt=""><figcaption></figcaption></figure>

7. Review the **Included and Excluded Targets** (all users are included by default).
8. Click **Save**.

## Step 4: Configure Conditional Access Policy in Entra ID (Optional) <a href="#microsoftentraidintegrationwitheam-step4-configureaconditionalaccesspolicyinentraid" id="microsoftentraidintegrationwitheam-step4-configureaconditionalaccesspolicyinentraid"></a>

{% hint style="info" %}
During migration, administrators are advised to create parallel **Conditional Access Policies** to test new configurations with a subset of users. This ensures minimal disruption and allows admins to verify the functionality of the custom controls.
{% endhint %}

1. Login to [**Microsoft Entra admin center.**](https://entra.microsoft.com/)
2. Navigate to **Protection → Conditional Access → Policies**.
3. Click **+ New Policy** (or edit an existing policy).

<figure><img src="https://support-cloud.hideez.com/~gitbook/image?url=https%3A%2F%2F1530474135-files.gitbook.io%2F%7E%2Ffiles%2Fv0%2Fb%2Fgitbook-x-prod.appspot.com%2Fo%2Fspaces%252F5ugbBHkpcN7qTDyuUyg8%252Fuploads%252FKLE19AkG8z1eHq1ZswZw%252FCreate-conditinal-access-policy.png%3Falt%3Dmedia%26token%3D0b6f404c-0809-43e8-9085-f4303b2c92e2&#x26;width=768&#x26;dpr=4&#x26;quality=100&#x26;sign=df082f9c&#x26;sv=2" alt=""><figcaption></figcaption></figure>

4. Configure the policy:

* **Specify Users**: Define the users who will be affected by this policy.
* **Target Applications**: Specify the applications covered by this policy.
* **Access Requirements**:
  * Choose **Require multifactor authentication** so that the EAM (Hideez Enterprise Server) is used as the MFA step.

<figure><img src="https://support-cloud.hideez.com/~gitbook/image?url=https%3A%2F%2F1530474135-files.gitbook.io%2F%7E%2Ffiles%2Fv0%2Fb%2Fgitbook-x-prod.appspot.com%2Fo%2Fspaces%252F5ugbBHkpcN7qTDyuUyg8%252Fuploads%252FtdEQuJkWNLSAPBkW8iUP%252Fimage%2520%282%29.png%3Falt%3Dmedia%26token%3D8cc62870-a9f5-4e88-b7b5-508e86f7de5d&#x26;width=768&#x26;dpr=4&#x26;quality=100&#x26;sign=a35273bd&#x26;sv=2" alt=""><figcaption></figcaption></figure>

5. Click on **Save**.

{% hint style="success" %}
More information from Microsoft can be found here [Using Custom Control and EAM in parallel](https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-external-method-manage#using-eam-and-conditional-access-custom-controls-in-parallel).
{% endhint %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://enterprise.hideez.com/hideez-server-integration/open-id-connect-integration/hideez-server-as-an-external-authentication-method-for-microsoft-entra-id-via-oidc.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
