Skip to content

Step 2: Entra ID Integration

This step adds Microsoft Entra ID as an external identity provider in NetBird. Users will see a “Sign in with Microsoft” button on the login page alongside the local email/password option.

Section titled “Why the Management Setup (Recommended) Flow”

NetBird offers two Entra ID integration paths. We use the Management Setup (Recommended) because:

  • Simpler configuration (7 steps vs 8+ for the standalone/legacy flow)
  • Keeps local authentication as a break-glass fallback
  • Does not require Microsoft Graph API permissions
  • Does not replace the embedded IdP — adds Entra ID alongside it
  • The standalone flow is labeled “Legacy” in the official docs
  1. Open the Entra Admin Center
  2. Navigate to Identity > Applications > App registrations
  3. Click + New registration
  4. Fill in:
FieldValue
NameNetBird
Supported account typesAccounts in this organizational directory only (GSISG only - Single tenant)
Redirect URILeave empty for now
  1. Do not click Register yet — keep this tab open and proceed to Step 2.2.
  1. Open a new browser tab and sign in to the NetBird Dashboard at https://netbird.gsisg.com
  2. Navigate to Settings > Identity Providers
  3. Click Add Identity Provider
  4. Fill in:
FieldValue
TypeMicrosoft Entra ID
NameGSISG Microsoft (display name on the login button)
Issuer URLLeave empty for now (will fill in Step 2.4)
Client IDLeave empty for now (will fill in Step 2.4)
Client SecretLeave empty for now (will fill in Step 2.4)
  1. Copy the Redirect URL that NetBird displays at the bottom of the form
  2. Do not click “Add Provider” yet — keep this tab open
  1. Return to the Entra Admin Center tab
  2. Click Register to create the app registration
  3. On the app’s Overview page, note these values:
ValueWhere to Find It
Application (client) IDOverview page, top section
Directory (tenant) IDOverview page, top section
  1. Construct the Issuer URL:
    https://login.microsoftonline.com/<DIRECTORY_TENANT_ID>/v2.0
    Replace <DIRECTORY_TENANT_ID> with the actual tenant ID from the Overview page.
  1. Still in the Entra Admin Center, click Authentication in the left menu
  2. Click Add a platform > Web
  3. In the Redirect URI field, paste the URL you copied from NetBird in Step 2.2
  4. Click Configure
  1. Click Certificates & secrets in the left menu
  2. Click + New client secret
  3. Fill in:
FieldValue
DescriptionNetBird SSO
Expires24 months (set a calendar reminder to rotate before expiry)
  1. Click Add
  2. Immediately copy the “Value” column (not the Secret ID) — it is shown only once
  1. Return to the NetBird Dashboard tab (from Step 2.2)
  2. Fill in the remaining fields:
FieldValue
Issuer URLhttps://login.microsoftonline.com/<TENANT_ID>/v2.0
Client IDThe Application (client) ID from Step 2.3
Client SecretThe secret Value you copied in Step 2.5
  1. Click Add Provider
  1. Log out of the NetBird Dashboard
  2. On the login page, you should now see:
    • “Continue with Email” (local authentication)
    • “GSISG Microsoft” button (or whatever name you used)
  3. Click the Microsoft button
  4. Sign in with a GSISG Entra ID account
  5. On first login, the user appears in NetBird but may require approval (depending on your settings)

2.8 Create Break-Glass Local Admin Accounts

Section titled “2.8 Create Break-Glass Local Admin Accounts”

Create at least two local admin accounts that do not depend on Entra ID. These serve as emergency access if Entra ID is unavailable.

  1. Sign in as the original local admin
  2. Navigate to Team > Users
  3. Invite a second local admin user (use a shared IT distribution list or a dedicated service account email)
  4. Set their role to Admin

What this does: When a user signs into NetBird with their Microsoft account, Entra ID includes their group memberships in the login token (JWT). NetBird reads these groups and automatically assigns the user to matching NetBird groups. This means you don’t have to manually assign users to groups in the NetBird dashboard — if someone is in the “Hawaii-Engineers” Entra group, they automatically get the Hawaii-Engineers access policies in NetBird.

When to skip this: For ~200 users with only 4-5 groups, it’s often simpler to just create the groups manually in the NetBird dashboard and assign users by hand. JWT group sync adds complexity (GUIDs instead of names, 200-group token limit) that may not be worth it at this scale.

If you do want automatic group sync from Entra ID:

  1. Go to your NetBird app registration
  2. Click Token configuration
  3. Click Add groups claim
  4. Select Security groups
  5. Under Customize token properties by type, expand ID and select Group ID
  6. Click Add
  1. Go to Enterprise applications > find NetBird
  2. Click Users and groups > + Add user/group
  3. Select the specific Entra groups you want synced to NetBird
  4. Click Assign
  1. Go to Settings > Groups
  2. Enable JWT group sync
  3. Set JWT claim to groups

At this point you should have:

  • Entra ID app registration (NetBird, single-tenant) in the GSISG tenant
  • Redirect URI configured as a Web platform
  • Client secret created and stored securely
  • Entra ID added as an identity provider in NetBird Dashboard
  • Successful SSO login test with a GSISG Entra ID account
  • At least two local break-glass admin accounts
  • (Optional) JWT group sync configured

Proceed to Step 3: Routing Peers to deploy the routing VMs at Honolulu and Boulder.