Azure Entra ID
This guide explains how to configure Azure Entra ID as an OIDC identity provider for Voquill Enterprise.
Prerequisites
Section titled “Prerequisites”- An Azure account with access to Microsoft Entra ID
- Voquill Enterprise gateway running
- Admin access to the Voquill admin panel
Azure Configuration
Section titled “Azure Configuration”1. Register the Application
Section titled “1. Register the Application”- Go to Microsoft Entra admin center
- Navigate to Identity → Applications → App registrations
- Click New registration
- Fill in the details:
- Name:
Voquill - Supported account types: Select based on your needs (single tenant for most enterprise setups)
- Redirect URI:
- Platform: Web
- URI:
https://your-gateway-url/auth/oidc/callback
- Name:
- Click Register
2. Note Your Application IDs
Section titled “2. Note Your Application IDs”On the application’s Overview page, copy these values:
| Field | Used For |
|---|---|
| Application (client) ID | Client ID in Voquill |
| Directory (tenant) ID | Constructing the Issuer URL |
3. Create a Client Secret
Section titled “3. Create a Client Secret”- In the left sidebar, click Certificates & secrets
- Go to the Client secrets tab
- Click New client secret
- Enter a description (e.g.,
voquill-gateway) - Choose an expiration period
- Click Add
- Immediately copy the secret Value (not the Secret ID) - it’s only shown once
Voquill Configuration
Section titled “Voquill Configuration”Add the Identity Provider
Section titled “Add the Identity Provider”- Open the Voquill admin panel
- Go to Identity Providers
- Click Add Provider
- Fill in:
| Field | Value |
|---|---|
| Name | Microsoft (appears on the login button) |
| Issuer URL | https://login.microsoftonline.com/{tenant-id}/v2.0 |
| Client ID | Application (client) ID from Azure |
| Client Secret | The secret value you created |
| Enabled | Yes |
Replace {tenant-id} with your Directory (tenant) ID from Azure.
- Click Save
Test the Flow
Section titled “Test the Flow”- Open the Voquill desktop app
- Connect to your enterprise server
- You should see a “Microsoft” SSO button
- Click it to authenticate via Azure
Troubleshooting
Section titled “Troubleshooting””AADSTS50011: The redirect URI does not match”
Section titled “”AADSTS50011: The redirect URI does not match””The redirect URI in Azure doesn’t match what the gateway is sending.
- Verify the redirect URI in Azure App Registration matches your gateway URL exactly
- Include the full path:
/auth/oidc/callback - Check http vs https
”AADSTS700016: Application not found”
Section titled “”AADSTS700016: Application not found””- Verify the Client ID is correct
- Make sure you’re using the Application (client) ID, not the Object ID
”Invalid issuer” error
Section titled “”Invalid issuer” error”- Verify the tenant ID in your Issuer URL is correct
- The URL must end with
/v2.0 - No trailing slash after
v2.0
User signs in but isn’t created in Voquill
Section titled “User signs in but isn’t created in Voquill”- Check that the Azure user has an email address set
- The OIDC flow requires the
emailclaim to create/match users