Microsoft Entra ID - OpenID Connect

Microsoft Entra ID can be set up as an OpenID Connect authentication provider to log users into a different Relativity instance. You need to complete some steps within Microsoft Entra ID and Relativity to user Entra ID OpenID Connect.

Note: We support B2C (business-to-customer) SSO integration through the OIDC and SAML2 protocols. Customers whose provider supports either of these protocols can integrate with RelativityOne. The following steps focus on registering an Azure application and credentials for Entra ID. If you're setting up Relativity with EntraID External ID (formerly known as AzureAD B2C), please refer to Microsoft's documentation.

Note: This content contains references to third-party software or technologies. While efforts are made to keep third-party references updated, note that screenshots, documentation or guidance in this topic may not accurately represent the current behavior or user interfaces of the third-party software. For additional considerations regarding third-party software such as copyright and ownership, please see the Terms of Use page.

Registering an Azure application and credentials

Before you begin configuring Entra ID in Relativity, you will need to add Relativity as an application within Entra ID.

  1. Log in to Azure Portal.
  2. Navigate to App registrationsfor Microsoft Entra ID (formerly known as Azure Active Directory).
  3. Click New registration.
  4. Enter an application name in the Name field.
  5. Accept the default setting, Accounts in this organizational directory only, as the supported account type.
  6. Click Register.
  7. Copy the Application (client) ID that was generated and past it to a safe location, as it will be used in a later step.
  8. Click the Endpoints button.
  9. Copy the OAuth 2.0 authorization endpoint (v2) URL that was generated and past it to a safe location, as it will be used in a later step.
  10. Trim the oauth2/v2.0/authorize from the URL. For example:
    					https://login.microsoftonline.com/8a3fa923-3223-4978-9d4d-fa012e19898b/oauth2/authorize
    				https://login.microsoftonline.com/8a3fa923-3223-4978-9d4d-fa012e19898b/

Configuring Entra ID OpenID Connect

Review the following list of settings that display on the Authentication Provider form. You can configure or update these settings based on your authentication needs.

Authentication provider information

  • Name—enter a user-friendly name for the authentication provider.
  • Provider Type—select OpenID Connect.
  • Enabled—the provider is enabled by default. However, you can disable it.
  • Site URL—set the URL that users enter in the browser to access an instance of Relativity.

Authentication provider settings

  • OAuth2 Flow—select either Implicit or Code.
  • Client ID—enter the Entra ID's Application ID.
  • Display on Login Screen—determines if the OpenID Connect button displays on the login page.
  • Login Screen Button Text—determines the text that appears on the button displayed on the login page.
  • Authority URL—enter the Authority from the trimmed OAUTH 2.0 AUTHORIZATIONENDPOINT from step 9 in Configuring your external identity provider. See Microsoft Entra ID - OpenID Connect.
  • Scopes—the default value for this field is openid. The openid checkbox must be selected because it's a required setting. However, you can also select the email or profile option. The identity provider responds with the claims associated with the scopes that you request. In other words, the scopes translate into claims that you can use.
  • Subject Claim Type—the default value for this field is sub. Enter one of the following values based on the scopes that you set:
    In Microsoft Entra ID, email is an optional claim and is not included in the OpenID token by default. Consider using upn instead. Consult with your Entra ID administrator to determine which claim type is best suited for your organization. For more information, see the Microsoft documentation on optional claims.
    • If you selected only OpenID in the Scopes field, this field must be set to sub.
    • If you selected OpenID and email in the Scopes field, set this field to upn.
    • If you selected OpenID and profile in the Scopes field, set this field to a property available from the identity provider. These properties differ for each provider.
    The identity provider sends an identity token to you, which contains the claims for your selected scopes. When you request only the openid scope, then sub is used as the claim type. It often represents a unique identifier for the user within your system. If you are using Entra ID, then see Microsoft identity platform ID tokens for a full list of token identifiers.