Set up Microsoft Entra External ID with Power Pages (preview)
[This article is prerelease documentation and is subject to change.]
Microsoft Entra External ID is a Customer Identity Access Management (CIAM) solution that personalizes and secures customers' and partners' access to websites and applications. It shares foundational technology with Azure B2C but operates as a distinct service, using the Microsoft Entra Admin Center instead of the Azure portal. Integrating External ID with Power Pages simplifies customer sign-ins and reduces development efforts. Learn more about Microsoft Entra External ID at Introduction to Microsoft Entra External ID.
Important
- This is a preview feature.
- Preview features aren’t meant for production use and might have restricted functionality. These features are subject to supplemental terms of use, and are available before an official release so that customers can get early access and provide feedback.
Note
Authentication setting changes may take a few minutes to reflect on your site. For immediate effect, restart the site in the admin center. Learn more about clearing the cache at How server-side caching works in Power Pages.
Set up Microsoft Entra External ID in Power Pages
Follow these steps to set up Microsoft Entra External ID in Power Pages:
Step 1: Add Microsoft Entra External ID as an identity provider
To configure Microsoft Entra as an identity provider:
Sign in to Power Pages Studio.
Locate the site where you want to enable Microsoft Entra External ID.
Select Edit.
Select Security > Identity providers.
Locate Microsoft Entra External ID (preview) as the login provider and select Configure.
Enter a name for the provider, such as Microsoft Entra External ID. This name appears on the button users see when they select their identity provider on the sign-in page.
Select Next.
Note
Keep your Power Pages browser tab open. You'll return to it soon.
Step 2: Set up Microsoft Entra External ID in the admin center
To set up Microsoft Entra External ID in the admin center, follow these steps.
Create an external tenant
If you don't have an external tenant, create one in the Microsoft Entra Admin Center. Start with a 30-day free trial or use an Azure subscription.
Register your application
Copy the Reply URL from your Power Pages site.
Sign in to the Microsoft Entra Admin Center and create an app registration using this URL as the redirect URI.
Under Applications, select App registrations, then select New registration.
Name your application (for example, power-pages-app).
Under Redirect URI, select Web as the platform.
Enter the reply URL of your site.
Note
If you're using your site's default URL, paste the reply URL you copied. If you're using a custom domain name, enter your custom URL. Use the same custom URL for the redirect URL in the settings for the identity provider on your site.
Select Register.
Under Manage, select the power-pages-app Authentication tab.
Select Access tokens and ID tokens, and then select Save.
On the API permissions tab, select Grant admin consent.
Create a user flow
- In the Microsoft Entra Admin Center, select External Identities > User flows.
- Select New user flow. If New user flow is disabled, learn how to enable it at Enable self-service sign-up for your tenant.
- Name the user flow (for example, Power-pages-user-flow) and select Email with password or Email one-time passcode.
- Select Create.
Add your application to the user flow
- On the user flow you created (power-pages-user-flow), select Applications > Add application.
- Select your application (for example, power-pages-app) and choose Select.
Step 3: Configure site settings in Power Pages
Go to the Power Pages identity provider configuration page and enter the following values:
Field Value Client ID Copy the Application (client) ID from App registrations > <your app registration>
> Overview in the Microsoft Entra admin center.Authority Copy the Authority URL from App registrations > <your app registration>
> Endpoints in the Microsoft Entra admin center.Redirect URL If your site uses a custom domain name, enter the custom URL; otherwise, leave the default value. Make sure the value is exactly the same as the redirect URI of the application you created. Metadata address Copy the OpenID Connect metadata document URL from App registrations > <your app registration>
> Endpoints in the Microsoft Entra admin center.Optionally, change the additional settings as needed.
Select Confirm when you're done.
Additional settings in Power Pages
The following optional settings offer more control over authentication:
Setting | Description |
---|---|
External logout | This setting controls external account sign-out. Turn it on to redirect users to the external sign-out experience when they sign out of your website. Turn it off to sign users out of your website only. |
Claims mapping | In user authentication, a claim is information that describes a user's identity, like an email address or date of birth. When you sign in to an application or a website, it creates a token. A token contains information about your identity, including any claims that are associated with it. Tokens are used to authenticate your identity when you access other parts of the application or site or other applications and sites that are connected to the same identity provider. Claims mapping is a way to change the information included in a token. It can be used to customize the information that's available to the application or site and to control access to features or data. Registration claims mapping modifies the claims that are emitted when you register for an application or a site. Login claims mapping modifies the claims that are emitted when you sign in to an application or a site. Learn more about claims mapping policies at Claims customization using a policy. |
Nonce lifetime | Enter the lifetime of the nonce value, in minutes. The default value is 10 minutes. |
Use token lifetime | This setting controls whether the authentication session lifetime, such as cookies, should match that of the authentication token. |
Contact mapping with email | This setting determines whether contacts are mapped to a corresponding email address when they sign in. This setting isn't applicable for multitenant endpoints. Use invitations or open registration to allow users to authenticate to your website. On: Associates a unique contact record with a matching email address and automatically assigns the external identity provider to the contact after the user successfully signs in. Off: Contacts aren't mapped to an email address when they sign in. |