MS Azure AD OIDC
This feature is available to Enterprise customers.
The following manual configuration creates an OIDC SSO configuration for your Enterprise organization.
- Owner or admin role in an Enterprise organization
- Administrative access to your organization's Microsoft Azure AD portal
This configuration supports the following:
- Service provider initiated SSO
- Single Log Out [optional]
Before configuring SSO, you need to assign a namespace and make files of your service provider certificate and private key. These steps provide the information you need to enter later.
Click Organization in the left sidebar.
Click the SSO tab.
Under Namespace, enter the namespace you want for your organization. For example, acme_corp. Your organization members enter this namespace when they log in via SSO.
Under SSO type, select SAML 2.0.
Copy the Redirect URL and save it in a safe place. You will use this later when you create your SAML integration in the Microsoft Azure AD portal.
Log in to the Microsoft Azure portal and navigate to the Azure Active Directory.

In the left navigation, click Enterprise applications.

Click + New Application.
Click + Create your own application.
Enter a name for your app and select Register an application to integrate with Azure AD (App your're developing).
Click Create.
Enter and select the following:
Field on the Register an application page | Required information |
---|---|
Name | Enter a name for your OIDC SSO app. |
Supported account types | Select the optoin that is best for your user case. For example, use Accounts in this organizational directory only if your application is only for internal use within your organization. |
Redirect URI (optional) | Although Microsoft marks this field as optional, successful implementation with requires the following: Select a platform - Web - https://next.integromat.com/sso/login |
Click Register.
In the Microsoft Azure AD portal go to Home > Enterprise applications > {your OIDC app} > Single Sign-on and click Go to application.
Under Essentials, find Application (client) ID. Copy this value and save it in a secure place. This is the required information for the Client ID field in your Make SSO configuration.
In the left navigation under Manage, click Certificates & secrets.
Click + New client secret.
In the new dialog box, enter a short description and click Add.
Find the new client secret on the list. Copy the Value and save it in a secure place. This is the required information for the Client secret field in your Make SSO configuration.
In the left navigation under Manage, click Token Configuration.
Click + Optional claim.
In the new dialog box, select ID.
A list appears. Select Email.
In the left navigation under Manage, click API Permissions.
Click + Add permission.
In the new dialog box, click Microsoft Graph.
Click Application permissions.
Use the search bar to find User.Read.All.
Select User.Read.All and click Add permissions.
To provide access to your organization members, you need to add these users to your app in the MS Azure portal.
In the Microsoft Azure AD portal go to Home > Enterprise applications > {your OIDC app}.
Click Users and groups.
Click + Add user/group to add the users you want to access your organization.
Click Organization in the left sidebar.
Click the SSO tab.
Enter the following information:
Field | Value |
---|---|
User information URL | https://graph.microsoft.com/v1.0/me |
Client ID | Enter the Application (client) ID you copied in step 2 of how to create your client credentials. |
Token URL | https://login.microsoftonline.com/1234etc/oauth2/v2.0/token |
Login scopes | User.Read.All |
Scopes separator | Enter a single space. |
Authorize URL | To find your Authorize URL:
|
Client secret | Enter the Value you copied in step 6 of how to create your client credentials. |
User infomration IML resolve | {"id":"{{id}}","email":"{{mail}}","name":"{{givenName}}"} |
Redirect URL | No action required |
Team provisioning for new users | Select an option based on your needs. |
Click Save.
You will receive an email with the subject "Activation complete: SSO ready for your organization" upon successful activation. If you encounter any issues while logging in using SSO, disable SSO using the "one-time link" (valid for 24 hours).
Go to make.com.
Click Sign in with SSO.
Enter the namespace you chose for your organization.
Log in using your Microsoft credentials and consent to 's access to your user data.