Introduction
This document describes how to configure Oloid External Authentication Method (EAM) in Microsoft Entra ID. The integration allows Oloid’s passwordless authentication to work with Microsoft Entra ID, enabling Oloid to act as an external MFA provider for secure and seamless access to enterprise applications.
Key highlights of this document include
Obtaining Essential Oloid Tenant Details
Client ID.
OpenID Configuration.
Authorization Endpoints.
Configuring Microsoft Entra ID
Testing the Integration
Verify the authentication flow by testing user access to integrated applications, such as ServiceNow. This configuration integrates Oloid’s passwordless authentication with Microsoft Entra ID (Azure AD) to enhance security and improve the user experience.
Step 1: Obtain Oloid Tenant Configuration
To configure Oloid as an External Authentication Method in Microsoft Entra ID, gather the following details from your Oloid tenant:
Client ID | <<################################>> |
OIDC Endpoint | |
Authorization Endpoint |
Step 2: Register and Configure an Application in Microsoft Entra ID
Register an application
Log in to the Microsoft Entra ID Portal with an account that has Global Administrator permissions or sufficient access to create applications.
Navigate to Microsoft Entra ID > App registrations > New registration.
The Register an application page is displayed.
Provide the following details:
Name: As per your requirements, e.g., test-dev-eam, oloid-eam or mfa-oloid-eam.
Redirect URI: Select Web from the drop-down list and Use the Authorization Endpoint from Step 1 in the redirected URL field.
Click Register.
The application is registered successfully.
After registration, Copy the Application ID of the newly registered application.
Configure the Application
Navigate to the newly registered app > Manage > Token Configuration > Click + Add optional claim.
The Add Optional Claim page is displayed.
Select ID as a Token type and do the following:
The Add optional claim pop-up box is displayed.
Select Turn on the Microsoft Graph checkbox and click Add to save the claims.
Go to Manage > API permissions > Grant required permissions.
The Grant Admin Consent Confirmation pop-up box is displayed.
Click Yes.
The API permission is configured successfully.
Create Client Secret
Navigate to newly registered app > Click Client Credentials.
The Certificates & secrets page is displayed.
Click New client secret.
The Add a client secret screen is displayed.
Do the following:
The Client Secret is added successfully and listed on Client Secret tab.
Step 3: Configure External Authentication Method in Microsoft Entra ID
Navigate to Application > Manage > Security.
The Security page is displayed.
Go to Manage > Authentication Methods.
The Authentication Methods page is displayed.
Click +Add external method (Preview).
The add external method (Preview) screen is displayed.
Do the following:
Accept the required permissions.
Click Save and enable the configuration.
Note: Ensure that you select only the users who require Oloid as MFA. Do not apply this setting to all users.
Step 4: Provide Microsoft Entra ID Information to Oloid
Share the following details of your Microsoft Entra ID tenant with Oloid for final configuration:
Configuration Detail | Value |
Tenant ID | Obtain from Microsoft Entra ID. |
Application ID | Found under Register an Application (Step 2). |
OIDC Endpoint | Found under Azure App Endpoints section. |
Redirect URL | Optional |
Callback URL | Optional |
Secret | Found under Create Client Secret (Step 2). |
The Tenant ID can be obtained from the following screen:
Instructions to Obtain Endpoints:
Navigate to App Registrations > Select the registered application > Endpoints.
The endpoints list is displayed.
Copy the OpenID Connect Meta data document URL.
Note: Use OpenID Connect Meta data document URL in the Authorize URL field. To see the Authorize URL field, go to Tenant Admin Portal > Auth Policies > Identity Provider > Select OIDC tab > IDP Settings.
Step 5: Apply Conditional Access Policies (Optional)
Note: Perform this step only if you need to protect a specific application by using Oloid as MFA or for selected user(s) group(s).
Navigate to Oloid-AzureAD > Security.
The security page is displayed.
Go to Protect > Conditional Access.
The conditional access page is displayed.
Click Policy Snapshot.
The Policy page is displayed.
Click +New Policy.
Click users or agents > Select Users and groups > select Users and Groups > Select the Preferred Group from the list e.g. oloid.
On Target Resources, select an application e.g. Service Now.
Click Access Control > Select Grant access > Click Select.
Note: Select Require multifactor authentication checkbox.
On Grant section, select Require one of the selected controls.
On Enable Policy, click On > Save.
The policy is configured successfully.
Step 6: Test the Integration
Test the integration using an application managed by Microsoft Entra ID e.g. ServiceNow
Open the ServiceNow application URL: https://<<servicenow_tenant>>.service-now.com
Log in with a user account that meets the following criteria:
Belongs to the snow-users group.
Has access to the ServiceNow application.
After entering the password, the user will be prompted for Oloid EAM.
Authenticate using Oloid MFA (ensure the user’s Oloid account has the same email as the Microsoft Entra ID UPN).
Upon successful authentication, the user will be logged into ServiceNow.
Related Articles
Keywords













