Microsoft SSO Provider
This section explains how to configure Microsoft as an SSO provider in Localtonet using Azure Active Directory (Microsoft Entra ID).
Microsoft SSO is ideal for organizations that manage users through Microsoft 365, Azure AD, or Entra ID.
Step 1: Create an App Registration in Azure Portal
Before adding Microsoft as an SSO provider in Localtonet, you need to register an application in Azure.
Go to Azure Portal
Navigate to: Microsoft Entra ID → App registrations
Click New registration.
Fill in the application details:
Name
Any descriptive name (e.g.Localtonet Tunnel SSO)Supported account types
Choose one:Accounts in this organizational directory only (single tenant)
Accounts in any organizational directory (multi-tenant – recommended)
Redirect URI
Platform: Web
URL:
http://auth.localtonet.com/auth/callback
Click Register.
Step 2: Create a Client Secret
Open the newly created app registration.
Navigate to: Certificates & secrets → Client secrets
Click New client secret.
Set an expiration period and click Add.
Copy the Client Secret value immediately (it will not be shown again).
Step 3: Copy Required Application Values
From the app registration overview page, copy:
Application (client) ID
Directory (tenant) ID (optional, required only for single-tenant setups)
You will use these values in Localtonet.
Step 4: Add Microsoft Provider in Localtonet
Open the SSO Providers section in your Localtonet account.
Click Add Provider.
Fill in the provider details:
Provider Name
Any descriptive name (e.g.Microsoft,Azure AD Login)Provider Type
Select MicrosoftClient ID
Paste the Application (client) IDClient Secret
Paste the Client Secret
The following endpoints are pre-filled automatically and should not be changed unless required:
Authorization Endpoint
https://login.microsoftonline.com/common/oauth2/v2.0/authorizeToken Endpoint
https://login.microsoftonline.com/common/oauth2/v2.0/tokenUserInfo Endpoint
https://graph.microsoft.com/oidc/userinfoCallback Path
/auth/callback/microsoft
If you want to restrict authentication to a single tenant, replace
commonwith your Tenant ID in both endpoints.
(Optional) Configure Allowed Email Domains
Example:
company.comOnly users with matching domains will be allowed access
Toggle Active to enable the provider.
Click Save.
Step 5: Enable Microsoft SSO for an HTTP Tunnel
Open the HTTP Tunnel Settings for the target tunnel.
Navigate to SSO Providers → Manage.
Enable SSO for this tunnel.
Toggle Microsoft to activate it.
Configure optional tunnel-level settings:
SSO Path(s) – paths that require authentication
Logout Path – logout endpoint
Allowed Domains / Emails / Usernames – additional access restrictions
Click Save Changes.
What Happens Next?
When a user accesses the tunnel URL:
The request is intercepted by the Localtonet authentication layer.
The user is redirected to Microsoft for authentication.
After successful login, the user is redirected back to the tunnel.
Access is granted only if provider and tunnel rules are satisfied.
Your application does not need to implement authentication logic.
Notes & Best Practices
Microsoft SSO uses OpenID Connect (OIDC)
Use single-tenant mode for internal corporate tools
Apply email domain restrictions for tighter access control
Rotate client secrets before expiration
Microsoft SSO can be enabled alongside other providers