Add Microsoft as an EASIE connection
You will learn the following:
- Use Microsoft to authenticate users with EASIE SSO.
Enabling EASIE SSO with Microsoft (formerly Active Directory) allows your users to sign up and sign in to your Clerk application with their Microsoft account.
Configure for your development instance
For development instances, Clerk uses preconfigured shared credentials and redirect URIs—no other configuration is needed.
- In the Clerk Dashboard, navigate to the SSO connections page.
- Select Add connection and select For specific domains or organizations.
- Under EASIE, select Microsoft.
- Enter the Domain. This is the email domain of the users you want to allow to sign in to your application. Optionally, select an Organization.
- Select Add connection.
Configure for your production instance
For production instances, you must provide custom credentials.
To make the setup process easier, it's recommended to keep two browser tabs open: one for the Clerk Dashboard and one for your Microsoft Azure portal.
Enable Microsoft as an EASIE connection
- In the Clerk Dashboard, navigate to the SSO connections page.
- Select Add connection and select For specific domains or organizations.
- Under EASIE, select Microsoft.
- Enter the Domain. This is the email domain of the users you want to allow to sign in to your application. Optionally, select an Organization.
- Save the Redirect URI somewhere secure. Keep this modal open to enter the OAuth credentials in the following steps.
Create a Microsoft Entra ID app
- On the homepage of the Microsoft Azure portal, in the Azure services section, select Microsoft Entra ID.
- In the left sidebar, in the Manage dropdown, select App registrations.
- Select New Registration. You'll be redirected to the Register an application page.
- Complete the form as follows:
- Under Name, enter your app name.
- Under Supported account types, select Accounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant) and personal Microsoft accounts (e.g. Skype, Xbox).
- Under Redirect URI (Optional), select Web.
- Select Register to submit the form.
Secure your app against the nOAuth vulnerability
nOAuth is an exploit in Microsoft Entra ID OAuth apps that can lead to account takeovers via email address spoofing. Clerk mitigates this risk by enforcing stricter checks on verified email addresses.
For further security, Microsoft offers an optional xms_edov
claim, which provides additional context to determine whether the returned email is verified.
This claim is mandatory for applications backing EASIE connections. To enable it, you must:
- In the Microsoft Azure portal, navigate to your app.
- In the left sidebar, in the Manage dropdown, select Token configuration.
- Select Add optional claim.
- For the Token type, select ID. Then, in the table that opens, enable the
email
andxms_pdl
claims. - At the bottom of the modal, select Add. A new modal will prompt you to turn on the Microsoft Graph email permission. Enable it, then select Add to complete the form.
- Repeat the previous steps but for Token type, select Access instead of ID. The Optional claims list should now show two claims for
email
and two forxms_pdl
: one each for ID and Access. - In the left sidebar, in the Manage dropdown, select Manifest.
- In the text editor, search for
"acceptMappedClaims"
and set its value fromnull
totrue
. - Search for
"optionalClaims"
, where you'll find theidToken
andaccessToken
arrays. Each array has an object with the namexms_pdl
. Change the name toxms_edov
. - At the top of the page, select Save.
- In the left sidebar, in the Manage dropdown, select Token configuration to confirm that the Optional claims list includes two claims for
email
and two forxms_edov
: one each for ID and Access.
With these steps complete, Microsoft will send the xms_edov
claim in the token, which Clerk will use to determine whether the email is verified, even when used with Microsoft Entra ID.
Get your client ID and client secret
- In the left sidebar, select Overview.
- Save the Application (client) ID somewhere secure. You'll need it to connect your Microsoft Entra ID app to your Clerk app.
- Under Client credentials, select Add a certificate or secret to generate a Client Secret. You'll be redirected to the Certificate & secrets page.
- Select New client secret. In the modal that opens, enter a description and set an expiration time for your secret.
- Save the new client secret's Value somewhere secure. You'll add this and your client ID to your Clerk app later. Keep this page open.
Set the Client ID and Client Secret in the Clerk Dashboard
Go back to the Clerk Dashboard, where the modal should still be open, and paste the Client ID and Client Secret values into the respective fields. Note that if you have any other Microsoft EASIE connections or a Microsoft social connection, this will update the credentials for all of them. Select Add connection.
Enable OpenID
To connect your Clerk app to your Microsoft app, set the Redirect URI in your Microsoft Azure portal.
- Navigate back to the Microsoft Azure portal.
- In the left sidebar, in the Manage dropdown, select Authentication.
- Select Add a platform.
- Select Web.
- In the Redirect URIs field and the Front-channel logout URL field, paste the Redirect URI you copied from the Clerk Dashboard.
- Under Implicit grant and hybrid flows, check both Access tokens and ID tokens.
- Select Configure to save the changes.
Feedback
Last updated on