Enabling Single Sign On with Microsoft Entra ID via OIDC
Roles and permissions
Only administrators can enable SSO for the organization
Note
Microsoft has renamed Azure AD to Microsoft Entra ID.
Hyperproof supports Single Sign On (SSO) with Microsoft Entra ID via OpenID Connect (OIDC). Once SSO is enabled for your organization, Hyperproof users will be able to log in with their Microsoft Entra ID credentials using a custom URL that is specific to your organization (e.g. https://luna.hyperproof.app
).
The first step towards enabling SSO in your organization is to add Hyperproof to your Microsoft Entra tenant. You’ll need a subdomain provisioned by Hyperproof Support. To get your subdomain, create a support request asking for SSO setup.
Note
If the domain is a .com
address, the subdomain is set as the domain without the .com
suffix.
If the domain is not a .com
address, the subdomain is set as the domain name without the period.
Examples
Domain name | Subdomain |
---|---|
http://acme.com | acme |
http://lunabtechnologies.com | lunabtechnologies |
http://techstartup.io | techstartupio |
http://whitehouse.gov | whitehousegov |
Expired client secret
Over time your client secret may expire, preventing users in your organization from logging into Hyperproof. If users can't log in due to an expired client secret, create a new secret in Azure and ask a Hyperproof organization administrator to update that secret in Hyperproof.