Use Microsoft Entra (Azure AD) for secure user authentication in Altostrat.
Leverage Microsoft Entra (formerly Azure AD) for user logins in Altostrat. This guide explains how to register an app in the Azure portal, get the client credentials, and integrate them into Altostrat for OAuth 2.0 flows.
Log into Azure Portal
Go to https://portal.azure.com and sign in. Use global search to find Microsoft Entra ID or Azure Active Directory.
Create App Registration
https://auth.altostrat.app/callback
.Register and Note Credentials
You won’t be able to view the client secret again after leaving the page. Store it in a safe place.
Open Integrations in Altostrat
From the Altostrat dashboard, choose Captive portal → Identity Providers.
Add Azure Credentials
Fill in the Client ID (Application ID), Client Secret, and Tenant ID from your Azure app registration.
Save & Test
Click Save, then perform a test sign-in to ensure Altostrat redirects to Azure and back successfully.
https://auth.altostrat.app/callback
matches the one in your Azure app.Deleting the integration breaks any user logins that rely on Microsoft Entra credentials. Have a fallback admin account if needed.