Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

docs: add docs for Microsoft Entra ID user auth OIDC docs and on changing access URL#20202

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Open
PhoenixSheppy wants to merge16 commits intocoder:main
base:main
Choose a base branch
Loading
fromPhoenixSheppy:main
Open
Show file tree
Hide file tree
Changes fromall commits
Commits
Show all changes
16 commits
Select commitHold shift + click to select a range
92cc645
Add Microsoft Entra ID OIDC Directions
PhoenixSheppyOct 7, 2025
5a4280d
Missed a few things, whoops.
PhoenixSheppyOct 7, 2025
6fa26dc
Update docs/admin/users/oidc-auth/microsoft.md
PhoenixSheppyOct 7, 2025
6c9dc1f
Update docs/admin/users/oidc-auth/microsoft.md
PhoenixSheppyOct 7, 2025
3edc9de
Update docs/admin/users/oidc-auth/microsoft.md
PhoenixSheppyOct 7, 2025
4602c69
add microsoft.md to manifest
PhoenixSheppyOct 7, 2025
2572b5b
Merge branch 'main' into main
PhoenixSheppyOct 8, 2025
3c5f2a5
Merge branch 'main' into main
PhoenixSheppyOct 8, 2025
49a855d
docs: provide information on changing access URL in FAQs.
PhoenixSheppyOct 8, 2025
46925d3
Merge branch 'main' into main
PhoenixSheppyOct 8, 2025
71f474b
Merge branch 'main' into main
PhoenixSheppyOct 8, 2025
3086f79
Merge branch 'main' into main
PhoenixSheppyOct 8, 2025
e54ed97
Merge branch 'main' into main
PhoenixSheppyOct 8, 2025
77cf4f0
Merge branch 'main' into main
PhoenixSheppyOct 9, 2025
f89767f
Merge branch 'main' into main
PhoenixSheppyOct 9, 2025
3cca5f0
Merge branch 'main' into main
PhoenixSheppyOct 9, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
62 changes: 62 additions & 0 deletionsdocs/admin/users/oidc-auth/microsoft.md
View file
Open in desktop
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
# Microsoft Entra ID authentication (OIDC)

This guide shows how to configure Coder to authenticate users with Microsoft Entra ID using OpenID Connect (OIDC).

## Prerequisites

- A Microsoft Azure Entra ID Tenant
- Permission to create Applications in your Azure environment

## Step 1: Create an OAuth App Registration in Microsoft Azure

1. Open Microsoft Azure Portal (https://portal.azure.com) → Microsoft Entra ID → App Registrations → New Registration.
2. Name: Name your application appropriately
3. Supported Account Types: Choose the appropriate radio button according to your needs. Most organizations will want to use the first one labeled "Accounts in this organizational directory only"
4. Click on "Register"
5. On the next screen, select: "Certificates and Secrets"
6. Click on "New Client Secret" and under description, enter an appropriate description. Then set an expiry and hit "Add" once it's created, copy the value and save it somewhere secure for the next step.
7. Next, click on the tab labeled "Token Configuration", then click "Add optional claim" and select the "ID" radio button, and finally check "upn" and hit "add" at the bottom.
8. Then, click on the button labeled "Add groups claim" and check "Security groups" and click "Save" at the bottom.
9. Now, click on the tab labeled "Authentication" and click on "Add a platform", select "Web" and for the redirect URI enter your Coder callback URL, and then hit "Configure" at the bottom:
- `https://coder.example.com/api/v2/users/oidc/callback`

## Step 2: Configure Coder OIDC for Microsoft Entra ID

Set the following environment variables on your Coder deployment and restart Coder:

```env
CODER_OIDC_ISSUER_URL=https://login.microsoftonline.com/{tenant-id}/v2.0 # Replace {tenant-id} with your Azure tenant ID
CODER_OIDC_CLIENT_ID=<client id, located in "Overview">
CODER_OIDC_CLIENT_SECRET=<client secret, saved from step 6>
# Restrict to one or more email domains (comma-separated)
CODER_OIDC_EMAIL_DOMAIN="example.com"
CODER_OIDC_EMAIL_FIELD="upn" # This is set because EntraID typically uses .onmicrosoft.com domains by default, this should pull the user's username@domain email.
# Optional: customize the login button
CODER_OIDC_SIGN_IN_TEXT="Sign in with Microsoft Entra ID"
CODER_OIDC_ICON_URL=/icon/microsoft.svg
```

> [!NOTE]
> The redirect URI must exactly match what you configured in Microsoft Azure Entra ID.

## Enable refresh tokens (recommended)

```env
# Keep standard scopes
CODER_OIDC_SCOPES=openid,profile,email
```

After changing settings, users must log out and back in once to obtain refresh tokens.

Learn more in [Configure OIDC refresh tokens](./refresh-tokens.md).

## Troubleshooting

- "invalid redirect_uri": ensure the redirect URI in Azure Entra ID matches `https://<your-coder-host>/api/v2/users/oidc/callback`.
- Domain restriction: if users from unexpected domains can log in, verify `CODER_OIDC_EMAIL_DOMAIN`.
- Claims: to inspect claims returned by Microsoft, see guidance in the [OIDC overview](./index.md#oidc-claims).

## See also

- [OIDC overview](./index.md)
- [Configure OIDC refresh tokens](./refresh-tokens.md)
5 changes: 5 additions & 0 deletionsdocs/manifest.json
View file
Open in desktop
Original file line numberDiff line numberDiff line change
Expand Up@@ -427,6 +427,11 @@
"description":"Configure Google as an OIDC provider",
"path":"./admin/users/oidc-auth/google.md"
},
{
"title":"Microsoft",
"description":"Configure Microsoft Entra ID as an OIDC provider",
"path":"./admin/users/oidc-auth/microsoft.md"
},
{
"title":"Configure OIDC refresh tokens",
"description":"How to configure OIDC refresh tokens",
Expand Down
24 changes: 24 additions & 0 deletionsdocs/tutorials/faqs.md
View file
Open in desktop
Original file line numberDiff line numberDiff line change
Expand Up@@ -559,3 +559,27 @@ confidential resources to their local machines.

For more advanced security needs, consider adopting an endpoint security
solution.

## How do I change the access URL for my Coder server?

You may want to change the default domain that's used to access coder, i.e. `yourcompany.coder.com` and find yourself unfamilar with the process.

To change the access URL associated with your server, you can edit any of the following variables:

- CLI using the `--access-url` flag
- YAML using the `accessURL` option
- or ENV using the `CODER_ACCESS_URL` environmental variable.

For example, if you're using an environment file to configure your server, you'll want to edit the file located at `/etc/coder.d/coder.env` and edit the following:

`CODER_ACCESS_URL=https://yourcompany.coder.com` to your new desired URL.

Then save your changes, and reload daemon-ctl using the following command:

`systemctl daemon-reload`

and restart the service using:

`systemctl restart coder`

After coder restarts, your changes should be applied and should reflect in the admin settings.

[8]ページ先頭

©2009-2025 Movatter.jp