Skip to main content
Skip table of contents

How To: Setup Azure AD (Entra ID) & Restrict Access

Overview

This user manual provides detailed instructions for setting up Microsoft Azure Active Directory (Entra ID) to enable secure authentication for the Captive Portal.
The steps include registering an application, collecting required credentials, and optionally restricting login access to specific users or groups.

Note:
All setup steps must be performed by a user with Administrator access to the Azure portal.

Prerequisites

Before you begin, ensure that you have:

  • Administrator access to your organization’s Azure Portal

  • Access to the Captive Admin Portal where Azure AD integration will be configured

  • A valid Microsoft Entra ID tenant

Creating an App Registration

  • Sign in to the Azure Portal.

  • Navigate to:
    Azure Active Directory → App registrations → + New registration

1-20251030-120505.png
  • Fill in the following details:

    • Name: Enter your application name (e.g., Captive Login).

    • Supported account types: Select Accounts in this organizational directory only (Single tenant).

    • Redirect URIs (optional):

      • Choose Web as the platform.

      • Enter the following URI:

        CODE
        https://api.k4mobility.com/captive/all/oauth/openid/callback
image-20251030-120646.png
  • Click Register to complete the app registration.

  • After registration, go back to App Registrations.

image-20251030-120859.png
  • Select the newly created application.

  • Navigate to Authentication from the left menu bar.

  • Ensure the platform settings are correct.

  • Scroll to Token Configuration and:

    • Enable ID Tokens

    • Under Advanced Settings, set Allow public client flows to No

  • Click Save.

Collecting Important Values

After registration, three key identifiers are required to configure authentication in the Captive Admin Portal.

1. Tenant ID (Unique for Organization)

  • From the Azure Portal Home, go to Microsoft Entra ID.

image-20251030-121134.png
  • Copy the Tenant ID displayed — this uniquely identifies your organization.

image (15)-20251030-153741.png

2. Client ID

  • Navigate to Azure Active Directory → App registrations.

image-20251030-122808.png
  • Select your registered application.

  • Copy the Client ID — this uniquely identifies your application.

3. Client Secret

  • Open the application, then go to Certificates & Secrets → Client secrets.

  • Click + New client secret.

image-20251030-122855.png
  • Fill in:

    • Description: (e.g., Captive Auth Secret)

    • Expires: Choose an appropriate duration.

image-20251030-122921.png
  • Click Add.

  • Copy the Secret Value immediately (it will only be visible once).

Captive Admin Portal Configuration

  • Login to the Captive Admin Portal.

  • Select the Portal Tab.

  • Select the Third Party Signup Page option from the left menu bar.

  • Enter the following values in the Captive Admin Portal’s Azure AD authentication section:

    • Tenant ID

    • Client ID

    • Client Secret

image-20251030-123022.png

This enables third-party login through Azure AD.

Restricting Application Access to Specific Users or Groups

If you wish to limit login access to selected users or groups, follow these steps:

  • In Azure Portal, navigate to:
    Microsoft Entra ID → Enterprise Applications

image-20251030-123251.png
  • Under Manage → All Applications, select the application used for Captive Login.

image-20251030-123308.png
image-20251030-123424.png
  • On overview, Assign users and groups will be present. On clicking Assign users and groups, it will take you to user assignment settings.

  • In the application menu, go to Properties.

    • Set Assignment required? to Yes.

    • Click Save.

image-20251030-123605.png
  • Then go to Users and Groups → + Add user/group.

image-20251030-123534.png
  • In the pop-up window:

    • Click Users and groups.

    • Select the desired users or groups.

    • Click Assign.

image-20251030-123654.png

Now, only the assigned users and groups can log in via Azure AD.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.