Requirements:

  • Access to Azure account with relevant permissions
  • A Bright Data account with admin permission

Steps:

  1. Go to https://brightdata.com and log in to your account.
  2. Choose  Settings->Account settings->Passwords & authentication in left side menu and toggle Microsoft Entra ID (Azur AD) switch

  1. Copy to clipboard value from Initiate login URI field by clicking on the copy button.

  1. Go to https://entra.microsoft.com/ and log in to your account. 
  2. Select Identity->Applications->App registrations on left side menu and click New registration:

  1. Type application name (e.g. brightdata).
    Select Accounts in this organizational directory only (Default Directory only - Single tenant).

    In Redirect URI (optional), select Web option, paste copied value from step (3) to the next field. Click Register button.

  1. On the newly created application, copy Directory (tenant) ID value by clicking the copy icon and paste it on Bright Data’s OAuth2 issuer (tenant) field in Configure EntraID form

  1. Do the same as the previous step for Application (client) ID value and paste it in Client ID field

  1. On your application, click on Add a certificate or secret

  1. Click on New client secret.
    Fill the Description field (e.g. brightdata secret), select the Expires option you want and press add

  1. Copy secret’s Value

  1. Paste copied value on your Configure EntraID form in Client secret field

  1. You may deny your users to sign in with email and password, and add exceptions.
  2. Press Activate
  3. You may customize your Users and groups on Identity->Applications->Enterprise applications->(your new application)->User settings

Was this page helpful?