Learn how to use Microsoft Entra ID (Azure Active Directory) credentials to login to Umbraco as a member.
This tutorial takes you through configuring Microsoft Entra ID (Azure Active Directory/Azure AD) for the member login on your Umbraco CMS website.
Entra ID conflicts with Umbraco ID which is the main authentication method used on all Umbraco Cloud projects.
Due to this, we highly recommend not using Azure AD for backoffice authentication on your Umbraco Cloud projects.
It is still possible to use other External Login Providers like Google Auth and OpenIdConnect, with Umbraco Cloud.
Prerequisites
A project with a setup for Members.
Visual Studio, or another Integrated Development Environment (IDE).
Step 1: Configure Entra ID
Before your applications can interact with Entra ID, they must be registered with a tenant that you manage. This can be either an Entra ID (Azure AD) tenant, or an Entra ID B2C (Azure AD B2C) tenant. For more information on creating an Azure AD B2C tenant, see Microsoft's Tutorial: Create an Azure Active Directory B2C tenant.
Step 2: Install the NuGet package
You need to install the Microsoft.AspNetCore.Authentication.MicrosoftAccount NuGet package. There are two approaches to installing the packages:
Use your favorite Integrated Development Environment (IDE) and open up the NuGet Package Manager to search and install the packages.
Use the command line to install the package.
Step 3: Implement the Entra ID Authentication
Create a new class for custom configuration options: EntraIDB2CMembersExternalLoginProviderOptions.cs.
EntraIDB2CMembersExternalLoginProviderOptions.cs
usingMicrosoft.Extensions.Options;usingUmbraco.Cms.Core;usingUmbraco.Cms.Web.Common.Security;namespaceMyApp;publicclassEntraIDB2CMembersExternalLoginProviderOptions:IConfigureNamedOptions<MemberExternalLoginProviderOptions>{publicconststring SchemeName ="ActiveDirectoryB2C";publicvoidConfigure(string? name,MemberExternalLoginProviderOptions options) {if (name !=Constants.Security.MemberExternalAuthenticationTypePrefix+ SchemeName) {return; }Configure(options); }publicvoidConfigure(MemberExternalLoginProviderOptions options) { // The following options are relevant if you // want to configure auto-linking on the authentication.options.AutoLinkOptions=newMemberExternalSignInAutoLinkOptions( // Set to true to enable auto-linking autoLinkExternalAccount:true, // [OPTIONAL] // Default: The culture specified in appsettings.json. // Specify the default culture to create the Member as. // It can be dynamically assigned in the OnAutoLinking callback. defaultCulture:null, // [OPTIONAL] // Specify the default "IsApproved" status. // Must be true for auto-linking. defaultIsApproved:true, // [OPTIONAL] // Default: "Member" // Specify the Member Type alias. defaultMemberTypeAlias:Constants.Security.DefaultMemberTypeAlias ) { // [OPTIONAL] Callbacks OnAutoLinking = (autoLinkUser, loginInfo) => { // Customize the Member before it's linked. // Modify the Members groups based on the Claims returned // in the external login info. }, OnExternalLogin = (user, loginInfo) => { // Customize the Member before it is saved whenever they have // logged in with the external provider. // Sync the Members name based on the Claims returned // in the external login info // Returns a boolean indicating if sign-in should continue or not.returntrue; } }; }}
Create a new static extension class called MemberAuthenticationExtensions.cs.
MemberAuthenticationExtensions.cs
namespaceMyApp;publicstaticclassMemberAuthenticationExtensions{publicstaticIUmbracoBuilderConfigureAuthenticationMembers(thisIUmbracoBuilder builder) {builder.Services.ConfigureOptions<EntraIDB2CMembersExternalLoginProviderOptions>();builder.AddMemberExternalLogins(logins => {builder.Services.ConfigureOptions<EntraIDB2CMembersExternalLoginProviderOptions>();builder.AddMemberExternalLogins(logins => {logins.AddMemberLogin( membersAuthenticationBuilder => {membersAuthenticationBuilder.AddMicrosoftAccount( // The scheme must be set with this method to work for the external login. membersAuthenticationBuilder.SchemeForMembers(EntraIDB2CMembersExternalLoginProviderOptions.SchemeName),
options => { // Callbackpath: Represents the URL to which the browser should be redirected to. // The default value is /signin-oidc. // This needs to be unique.options.CallbackPath="/umbraco-b2c-members-signin"; //Obtained from the ENTRA ID B2C WEB APPoptions.ClientId="YOURCLIENTID"; //Obtained from the ENTRA ID B2C WEB APPoptions.ClientSecret="YOURCLIENTSECRET"; // If you are using single-tenant app registration (e.g. for an intranet site), you must specify the Token Endpoint and Authorization Endpoint:
//options.TokenEndpoint = $"https://login.microsoftonline.com/{tenantId}/oauth2/v2.0/token";
//options.AuthorizationEndpoint = $"https://login.microsoftonline.com/{tenantId}/oauth2/v2.0/authorize";
options.SaveTokens=true; }); }); }); });return builder; }); }}
Ensure to replace YOURCLIENTID and YOURCLIENTSECRET in the code with the values from the Entra ID tenant. If Entra ID is configured to use accounts in the organizational directory only (single tenant registration), you must specify the Token and Authorization endpoint. For more information on the differences between single and multi tenant registration, refer to Microsoft's identity platform documentation.
Add the Members authentication configuration in the Program.cs file:
Program.cs
builder.CreateUmbracoBuilder() .AddBackOffice() .AddWebsite() .AddDeliveryApi() .AddComposers() //Add Members ConfigureAuthentication .ConfigureAuthenticationMembers() .Build();
Are you building a package for Umbraco?
Then you will not have access to the Program.cs file. Instead you need to create a composer in order to register your extension method.