Applies to:
- Agency Owners
- Administrators
Overview
BindHQ can be configured to allow login via a Microsoft account, enabling secure single sign-on (SSO) and access to associated Outlook email accounts within the application.
Note: Microsoft Entra ID is the new name for Azure Active Directory (Azure AD). All features and functionality remain the same.
This article explains how to configure the integration and how to use it after login.
Step 1: Register an Application in Microsoft Entra ID
-
Sign in to the Microsoft Entra Admin Center
https://entra.microsoft.com -
In the left-hand menu, navigate to:
Identity → Applications → App registrations
Enterprise ViewProfessional View
-
Click "New registration" and fill out the registration form:
-
Name: BindHQ Integration
-
Supported account types: Choose the option that matches your organization
-
Redirect URI (Web):
Replace
CLIENT
with your actual BindHQ subdomain.
-
The value for this field should be https://CLIENT.bindhq.com/login/check-microsoft (where CLIENT is your BindHQ client name). You may also need to add the following permission to the application, depending on if permission can be granted for the organization by an admin when logging in.
- offline_access
- openid
- profile
- User.Read
- Mail.Send
- Mail.ReadWrite
Next, you will need to create some authentication secrets for the Client Details.
Navigate to “Certificates & secrets”.
In the "Client secrets" section choose "New client secret"
Ensure the name is descriptive enough to be able to identify its purpose. This should be a description that will be familiar to you, (the client), such as an integration with BindHQ.
NOTES:
- Copy this secret value to a secure location now, this is the only time it will be visible.
- Set an expiration based on your best practices (180 or 365 days) but also set a reminder to update these secrets BEFORE they expire.
BINDHQ Details:
-
Directory (tenant) ID (BindHQ tenant ID)
-
Application (client) ID (BindHQ client ID)
-
Secret value (BindHQ client secret)
In BindHQ, navigate to the O365 credentials page in the settings area.
Settings > Organizational Settings > Office 365 Credentials
From here you can proceed to edit the details you created in the Azure portal.
After clicking save, you should be able to log out (or use a different browser) and test the configuration using the "Sign In with Microsoft" button on the login page.
Tips & Best Practices
-
Redirect URIs must match exactly (case-sensitive, https, no wildcards) learn.microsoft.com+15learn.microsoft.com+15learn.microsoft.com+15learn.microsoft.comlearn.microsoft.com+3learn.microsoft.com+3learn.microsoft.com+3learn.microsoft.com+1mull-overthing.com+1.
-
You can register multiple redirect URIs (e.g., for development and production) via the Authentication pane learn.microsoft.com+13learn.microsoft.com+13architect.pub+13.
-
For OAuth2/OpenID Connect, always use the Web platform. SAML integrations instead use “Reply URL”.
Keywords for Search:
- Office365
- M365
- Entra ID
- Integration
- Azure Portal
Comments
0 comments
Please sign in to leave a comment.