Creating an external authentication method in Microsoft Entra
After creating the OIDC application in PingOne and copying the application ID, OIDC discovery endpoint, and client ID, create an EAM in Microsoft Entra.
Steps
-
Go to the Microsoft Entra admin center.
-
On the left, go to Protection > Authentication methods.
-
Click App external method.
-
Enter the following:
-
Name: Enter a name for the EAM.
-
Client ID: Enter your PingOne application’s client ID that you copied earlier.
-
Discovery Endpoint: Enter the OIDC Discovery Endpoint that you copied earlier. The format is
<issuer>/.well-known/openid-configuration
. -
App ID: Enter the ID of the Microsoft Entra application that you copied previously. You can find the application ID in the Microsoft Entra admin center.
-
-
Click Request permission.
The browser opens a new window for you to sign on with your Microsoft Entra admin credentials.
-
Review the requested permissions and click Accept if you agree.
-
In the Enable and target section, configure whether you want to include a subset of your users or all users.
-
Click the Enable toggle to enable the EAM.