This guide walks you through configuring single sign-on (SSO) for Brellium using Microsoft Entra ID (formerly Azure Active Directory). You register an application in your Entra ID tenant and provide the credentials to Brellium to complete the connection.Documentation Index
Fetch the complete documentation index at: https://sso.brellium.dev/llms.txt
Use this file to discover all available pages before exploring further.
Prerequisites
Before you begin, ensure you have:- Administrator access to your Microsoft Entra ID tenant
- A Brellium admin account with permissions to authorize integrations
Supported features
The Brellium Microsoft Entra ID integration supports the following features:- SP-initiated SSO — Users can sign in to Brellium from the Brellium sign-in page, which redirects to Microsoft Entra ID for authentication.
- IdP-initiated SSO — Users can sign in to Brellium directly from the Microsoft My Apps portal by clicking the Brellium tile.
- Just-In-Time (JIT) provisioning — User accounts are automatically created in Brellium on first sign-in through Microsoft Entra ID. The following attributes are provisioned:
- Email address
- Full name
- Federated logout (SLO) — Users who sign out from Brellium also have their Microsoft Entra ID session terminated.
To provision and deprovision users in Brellium using SCIM, see the SCIM Provisioning Configuration guide.
Configuration steps
Register an application in Microsoft Entra ID
- Sign in to the Microsoft Entra admin center.
- Go to Identity > Applications > App registrations.
- Click New registration.
- Configure the following settings:
| Setting | Value |
|---|---|
| Name | Brellium (or your preferred application label) |
| Supported account types | Select Accounts in this organizational directory only (Single tenant) to limit access to your organization. To allow users from external Azure AD directories, select Accounts in any organizational directory (Any Azure AD directory - Multitenant). |
| Redirect URI | Select Web and enter the callback URL provided by Brellium. |
- Click Register.
- In the registered Brellium application, go to Authentication under Manage.
- Click Add a platform and select Web.
- Enter the Redirect URI provided by Brellium.
- Click Configure.
Create a client secret
- In the registered Brellium application, go to Certificates & secrets under Manage.
- Click New client secret.
- Enter a description (e.g.,
Brellium SSO) and select an expiration period.
- Click Add.
- Copy the Value of the new client secret immediately — it is only shown once.
Add API permissions
- In the registered Brellium application, go to API permissions under Manage.
- Click Add a permission > Microsoft Graph > Delegated permissions.
- Add the following permissions:
| Permission | Description |
|---|---|
| User.Read | Allows the app to sign in users and read their profiles |
| Directory.Read.All | Allows the app to read directory data on the signed-in user’s behalf |
- Click Add permissions.
- If required by your organization, click Grant admin consent to consent on behalf of all users in the directory.
Provide credentials to Brellium
Provide the following values to your Brellium customer success manager or Brellium support to complete the connection:
Brellium configures the enterprise connection on your behalf. You will be notified when the setup is complete.
| Value | Where to find it |
|---|---|
| Application (client) ID | App registrations > Brellium > Overview |
| Client secret | The secret value you copied in the previous step |
| Microsoft Entra ID domain | Your Azure AD directory’s primary domain (e.g., yourcompany.onmicrosoft.com), found on the directory’s Overview page |
Grant admin consent
Once Brellium has configured the connection, an administrator in your Azure AD tenant must grant consent for the application. Your Brellium contact will provide a consent URL.
- Open the consent URL in a browser.
- Sign in with an Azure AD administrator account.
- Review the permissions and click Accept.
If you do not have the appropriate Azure AD administrative permissions to grant consent, share the consent URL with an administrator in your organization.
Assign users and groups
- In the Microsoft Entra admin center, go to Identity > Applications > Enterprise applications.
- Select the Brellium application.
- Go to Users and groups under Manage.
- Click Add user/group.
- Select the users or groups to assign and click Assign.
Verify the configuration
Verify that SSO is working correctly.Verify IdP-initiated SSO:
- Go to the Microsoft My Apps portal.
- Click the Brellium tile.
- Confirm that you are signed in to Brellium without being prompted for additional credentials.
- Open a new browser window and go to the Brellium sign-in page.
- Click Sign in with Microsoft.
- Enter your Microsoft Entra ID credentials.
- Confirm that you are signed in to Brellium.
SP-initiated SSO
After the integration is configured, users can sign in to Brellium using one of the following methods:For SP-initiated SSO, users must access Brellium through one of the options below. Direct sign-in at
app.brellium.com without a verified domain will not automatically redirect to Microsoft Entra ID.https://myorganization.brellium.app). You are automatically redirected to Microsoft Entra ID for authentication.
Option 2: Sign in with a verified domain
If your organization has configured verified domains:
- Go to https://app.brellium.com.
- Enter your email address.
- You are automatically redirected to Microsoft Entra ID for authentication based on your email domain.
Troubleshoot
| Issue | Cause | Solution |
|---|---|---|
| ”Access cannot be granted to this service” error | Supported account types are misconfigured | Verify the Supported account types in the app registration. If external users need access, select the appropriate multitenant option. |
| ”invalid_request; failed to obtain access token” error | Azure AD client secret is invalid or expired | Generate a new client secret in Azure AD and provide the updated value to Brellium |
| Users aren’t created on first sign-in | Just-In-Time provisioning isn’t enabled | Contact Brellium support to enable JIT provisioning for your organization |
| Application not visible in Azure AD | App was registered in the wrong directory | Verify you are in the correct Azure AD tenant and re-register the application if needed |
Signing key rollover
Microsoft Entra ID periodically rolls its signing keys for security purposes. You do not need to take any action — Brellium uses the new key automatically.Support
If you have questions or encounter issues not covered in this guide, contact the Brellium support team:- Email: sso.support@brellium.com