This section explains how to configure Microsoft as an SSO provider in Localtonet using Azure Active Directory (Microsoft Entra ID).
Microsoft SSO is ideal for organizations that manage users through Microsoft 365, Azure AD, or Entra ID.
Before adding Microsoft as an SSO provider in Localtonet, you need to register an application in Azure.
Go to Azure Portal
Navigate to: Microsoft Entra ID → App registrations
Click New registration.
Fill in the application details:
Name
Any descriptive name (e.g. Localtonet Tunnel SSO)
Supported account types
Choose one:
Accounts in this organizational directory only (single tenant)
Accounts in any organizational directory (multi-tenant – recommended)
Redirect URI
Platform: Web
URL:
http://auth.localtonet.com/auth/callback
Click Register.
Open the newly created app registration.
Navigate to: Certificates & secrets → Client secrets
Click New client secret.
Set an expiration period and click Add.
Copy the Client Secret value immediately (it will not be shown again).
From the app registration overview page, copy:
Application (client) ID
Directory (tenant) ID (optional, required only for single-tenant setups)
You will use these values in Localtonet.
Open the SSO Providers section in your Localtonet account.
Click Add Provider.
Fill in the provider details:
Provider Name
Any descriptive name (e.g. Microsoft, Azure AD Login)
Provider Type
Select Microsoft
Client ID
Paste the Application (client) ID
Client Secret
Paste the Client Secret
The following endpoints are pre-filled automatically and should not be changed unless required:
Authorization Endpoint
https://login.microsoftonline.com/common/oauth2/v2.0/authorize
Token Endpoint
https://login.microsoftonline.com/common/oauth2/v2.0/token
UserInfo Endpoint
https://graph.microsoft.com/oidc/userinfo
Callback Path
/auth/callback/microsoft
If you want to restrict authentication to a single tenant, replace
commonwith your Tenant ID in both endpoints.
(Optional) Configure Allowed Email Domains
Example: company.com
Only users with matching domains will be allowed access
Toggle Active to enable the provider.
Click Save.
Open the HTTP Tunnel Settings for the target tunnel.
Navigate to SSO Providers → Manage.
Enable SSO for this tunnel.
Toggle Microsoft to activate it.
Configure optional tunnel-level settings:
SSO Path(s) – paths that require authentication
Logout Path – logout endpoint
Allowed Domains / Emails / Usernames – additional access restrictions
Click Save Changes.
When a user accesses the tunnel URL:
The request is intercepted by the Localtonet authentication layer.
The user is redirected to Microsoft for authentication.
After successful login, the user is redirected back to the tunnel.
Access is granted only if provider and tunnel rules are satisfied.
Your application does not need to implement authentication logic.
Microsoft SSO uses OpenID Connect (OIDC)
Use single-tenant mode for internal corporate tools
Apply email domain restrictions for tighter access control
Rotate client secrets before expiration
Microsoft SSO can be enabled alongside other providers