How To: Setup Azure AD (Entra ID) & Restrict Access
Overview
This user manual provides detailed instructions for setting up Microsoft Azure Active Directory (Entra ID) to enable secure authentication for the Captive Portal.
The steps include registering an application, collecting required credentials, and optionally restricting login access to specific users or groups.
Note:
All setup steps must be performed by a user with Administrator access to the Azure portal.
Prerequisites
Before you begin, ensure that you have:
Administrator access to your organization’s Azure Portal
Access to the Captive Admin Portal where Azure AD integration will be configured
A valid Microsoft Entra ID tenant
Creating an App Registration
Sign in to the Azure Portal.
Navigate to:
Azure Active Directory → App registrations → + New registration

Fill in the following details:
Name: Enter your application name (e.g., Captive Login).
Supported account types: Select Accounts in this organizational directory only (Single tenant).
Redirect URIs (optional):
Choose Web as the platform.
Enter the following URI:
CODEhttps://api.k4mobility.com/captive/all/oauth/openid/callback

Click Register to complete the app registration.
After registration, go back to App Registrations.

Select the newly created application.
Navigate to Authentication from the left menu bar.
Ensure the platform settings are correct.
Scroll to Token Configuration and:
Enable ID Tokens
Under Advanced Settings, set Allow public client flows to No
Click Save.
Collecting Important Values
After registration, three key identifiers are required to configure authentication in the Captive Admin Portal.
1. Tenant ID (Unique for Organization)
From the Azure Portal Home, go to Microsoft Entra ID.

Copy the Tenant ID displayed — this uniquely identifies your organization.
-20251030-153741.png?inst-v=37211f99-9fac-464c-acd7-3d96112758c4)
2. Client ID
Navigate to Azure Active Directory → App registrations.

Select your registered application.
Copy the Client ID — this uniquely identifies your application.
3. Client Secret
Open the application, then go to Certificates & Secrets → Client secrets.
Click + New client secret.

Fill in:
Description: (e.g., Captive Auth Secret)
Expires: Choose an appropriate duration.

Click Add.
Copy the Secret Value immediately (it will only be visible once).
Captive Admin Portal Configuration
Login to the Captive Admin Portal.
Select the Portal Tab.
Select the Third Party Signup Page option from the left menu bar.
Enter the following values in the Captive Admin Portal’s Azure AD authentication section:
Tenant ID
Client ID
Client Secret

This enables third-party login through Azure AD.
Restricting Application Access to Specific Users or Groups
If you wish to limit login access to selected users or groups, follow these steps:
In Azure Portal, navigate to:
Microsoft Entra ID → Enterprise Applications

Under Manage → All Applications, select the application used for Captive Login.


On overview, Assign users and groups will be present. On clicking Assign users and groups, it will take you to user assignment settings.
In the application menu, go to Properties.
Set Assignment required? to Yes.
Click Save.

Then go to Users and Groups → + Add user/group.

In the pop-up window:
Click Users and groups.
Select the desired users or groups.
Click Assign.

Now, only the assigned users and groups can log in via Azure AD.