- Elastic Docs/
- Deploy and manage/
- Users and roles/
- Cluster or deployment/
- User authentication/
- External authentication/
- OpenID Connect
Set up OpenID Connect with Azure, Google, or Okta
This page explains how to implement OIDC, from the OAuth client credentials generation to the realm configuration for Elasticsearch and Kibana, with the following OpenID Connect Providers (OPs):
For further detail about configuring OIDC, refer toOpenID Connect authentication
Follow these steps to configure OpenID Connect single sign-on on in Elasticsearch with an Azure OP.
For more information about OpenID connect in Azure, refer toAzure OAuth 2.0 and OpenID documentation.
Configure the OAuth client ID.
Create a new application:
Sign into theAzure Portal and go toEntra (formerly Azure Active Directory). From there, selectApp registrations >New registration to register a new application.

Enter aName for your application, for exampleec-oauth2.
Select aSupported Account Type according to your preferences.
Set theRedirect URI.
It will typically be<KIBANA_ENDPOINT_URL>/api/security/oidc/callback, where<KIBANA_ENDPOINT_URL> is the base URL for your Kibana instance.
If you're using Elastic Cloud Hosted, then set this value to<KIBANA_ENDPOINT_URL>/api/security/oidc/callback.
SelectRegister.
Confirm that your newApplication (client) ID appears in the app details.
Create a client ID and secret:



