Skip to main content
All CollectionsHotel System Integrations
SSO with Microsoft Entra ID (IdP)
SSO with Microsoft Entra ID (IdP)

Step by step guide to setup SSO with Microsoft Entra ID.

Andy Dharmani avatar
Written by Andy Dharmani
Updated over a week ago provides OpenID based SSO option that allows Dashboard to connect to an IdP and provide SSO for your users.

Microsoft Entra ID is a cloud-based identity and access management solution. To enable SSO to log into the Dashboard (, using your Microsoft Entra ID you need to set up the application in your identity provider.

This is a one-time setup, follow the step-by-step guide to help you set up the application in Azure. Once the setup is complete your staff will be allowed to login to Dashboard only through the Microsoft credentials. The Authorization is managed in, so permissions to parts of the application are still configured in the Dashboard by the Admin privilege users.

Open and select Azure Entra ID. Follow the following steps to set up the application.

Step 1: Register app

  1. Select App registrations in the left-hand menu

  2. Click New Registrations on the top panel

Step 2: Configure initial settings

  1. Under Name enter Myma SSO

  2. Under Supported account types keep the default settings as Accounts in this organizational directory only. Select Other if you require a special setting.

  3. Under Redirect URI, select Web and enter

  4. Click Register

Step 3: Create Client Secret

  1. Select Certificates & Secrets in the left-hand panel. Then, on the center panel below the Client Secrets, click on New client secret.

  2. Name the new client secret as Myma SSO, and select a proper expiration date. You will not be automatically notified when this client secret expires, so you will need to monitor this on your own.

  3. Click Add.

  4. Copy the secret value to a safe place. You will need it later to send it to the team.

Step 4: Setup permissions

  1. Select API permissions in the left-hand panel

  2. On the center panel, there should already be a default permission entitled User.Read. If not, insert it manually.

  3. Click Add a permission in the center panel. Select Microsoft Graph, then select Delegated permissions.

  4. Check the box for email, then click Add permissions

Step 5: Collect endpoints

  1. Select Overview in the left left-hand panel

  2. Copy the Application (client) ID text, which you will provide to in the next step

Step 6: Share info with

Pass the following information to the team. Please do not email this information. will coordinate a safe way to exchange this information

  1. Application (Client) ID

  2. Tenant Id

  3. Client Secret

Step 7: Setup will configure the setup so that the SSO is integrated

Did this answer your question?