Step 2: Entra ID Integration
This step adds Microsoft Entra ID as an external identity provider in NetBird. Users will see a “Sign in with Microsoft” button on the login page alongside the local email/password option.
Why the Management Setup (Recommended) Flow
Section titled “Why the Management Setup (Recommended) Flow”NetBird offers two Entra ID integration paths. We use the Management Setup (Recommended) because:
- Simpler configuration (7 steps vs 8+ for the standalone/legacy flow)
- Keeps local authentication as a break-glass fallback
- Does not require Microsoft Graph API permissions
- Does not replace the embedded IdP — adds Entra ID alongside it
- The standalone flow is labeled “Legacy” in the official docs
2.1 Start the App Registration in Entra
Section titled “2.1 Start the App Registration in Entra”- Open the Entra Admin Center
- Navigate to Identity > Applications > App registrations
- Click + New registration
- Fill in:
| Field | Value |
|---|---|
| Name | NetBird |
| Supported account types | Accounts in this organizational directory only (GSISG only - Single tenant) |
| Redirect URI | Leave empty for now |
- Do not click Register yet — keep this tab open and proceed to Step 2.2.
2.2 Get the Redirect URL from NetBird
Section titled “2.2 Get the Redirect URL from NetBird”- Open a new browser tab and sign in to the NetBird Dashboard at
https://netbird.gsisg.com - Navigate to Settings > Identity Providers
- Click Add Identity Provider
- Fill in:
| Field | Value |
|---|---|
| Type | Microsoft Entra ID |
| Name | GSISG Microsoft (display name on the login button) |
| Issuer URL | Leave empty for now (will fill in Step 2.4) |
| Client ID | Leave empty for now (will fill in Step 2.4) |
| Client Secret | Leave empty for now (will fill in Step 2.4) |
- Copy the Redirect URL that NetBird displays at the bottom of the form
- Do not click “Add Provider” yet — keep this tab open
2.3 Complete the App Registration
Section titled “2.3 Complete the App Registration”- Return to the Entra Admin Center tab
- Click Register to create the app registration
- On the app’s Overview page, note these values:
| Value | Where to Find It |
|---|---|
| Application (client) ID | Overview page, top section |
| Directory (tenant) ID | Overview page, top section |
- Construct the Issuer URL:
Replacehttps://login.microsoftonline.com/<DIRECTORY_TENANT_ID>/v2.0
<DIRECTORY_TENANT_ID>with the actual tenant ID from the Overview page.
2.4 Configure the Redirect URI
Section titled “2.4 Configure the Redirect URI”- Still in the Entra Admin Center, click Authentication in the left menu
- Click Add a platform > Web
- In the Redirect URI field, paste the URL you copied from NetBird in Step 2.2
- Click Configure
2.5 Create a Client Secret
Section titled “2.5 Create a Client Secret”- Click Certificates & secrets in the left menu
- Click + New client secret
- Fill in:
| Field | Value |
|---|---|
| Description | NetBird SSO |
| Expires | 24 months (set a calendar reminder to rotate before expiry) |
- Click Add
- Immediately copy the “Value” column (not the Secret ID) — it is shown only once
2.6 Complete the NetBird Configuration
Section titled “2.6 Complete the NetBird Configuration”- Return to the NetBird Dashboard tab (from Step 2.2)
- Fill in the remaining fields:
| Field | Value |
|---|---|
| Issuer URL | https://login.microsoftonline.com/<TENANT_ID>/v2.0 |
| Client ID | The Application (client) ID from Step 2.3 |
| Client Secret | The secret Value you copied in Step 2.5 |
- Click Add Provider
2.7 Test SSO Login
Section titled “2.7 Test SSO Login”- Log out of the NetBird Dashboard
- On the login page, you should now see:
- “Continue with Email” (local authentication)
- “GSISG Microsoft” button (or whatever name you used)
- Click the Microsoft button
- Sign in with a GSISG Entra ID account
- On first login, the user appears in NetBird but may require approval (depending on your settings)
2.8 Create Break-Glass Local Admin Accounts
Section titled “2.8 Create Break-Glass Local Admin Accounts”Create at least two local admin accounts that do not depend on Entra ID. These serve as emergency access if Entra ID is unavailable.
- Sign in as the original local admin
- Navigate to Team > Users
- Invite a second local admin user (use a shared IT distribution list or a dedicated service account email)
- Set their role to Admin
2.9 Configure JWT Group Sync (Optional)
Section titled “2.9 Configure JWT Group Sync (Optional)”What this does: When a user signs into NetBird with their Microsoft account, Entra ID includes their group memberships in the login token (JWT). NetBird reads these groups and automatically assigns the user to matching NetBird groups. This means you don’t have to manually assign users to groups in the NetBird dashboard — if someone is in the “Hawaii-Engineers” Entra group, they automatically get the Hawaii-Engineers access policies in NetBird.
When to skip this: For ~200 users with only 4-5 groups, it’s often simpler to just create the groups manually in the NetBird dashboard and assign users by hand. JWT group sync adds complexity (GUIDs instead of names, 200-group token limit) that may not be worth it at this scale.
If you do want automatic group sync from Entra ID:
In Entra Admin Center
Section titled “In Entra Admin Center”- Go to your NetBird app registration
- Click Token configuration
- Click Add groups claim
- Select Security groups
- Under Customize token properties by type, expand ID and select Group ID
- Click Add
In Entra Enterprise Applications
Section titled “In Entra Enterprise Applications”- Go to Enterprise applications > find NetBird
- Click Users and groups > + Add user/group
- Select the specific Entra groups you want synced to NetBird
- Click Assign
In NetBird Dashboard
Section titled “In NetBird Dashboard”- Go to Settings > Groups
- Enable JWT group sync
- Set JWT claim to
groups
Verification
Section titled “Verification”At this point you should have:
- Entra ID app registration (
NetBird, single-tenant) in the GSISG tenant - Redirect URI configured as a Web platform
- Client secret created and stored securely
- Entra ID added as an identity provider in NetBird Dashboard
- Successful SSO login test with a GSISG Entra ID account
- At least two local break-glass admin accounts
- (Optional) JWT group sync configured
Next Step
Section titled “Next Step”Proceed to Step 3: Routing Peers to deploy the routing VMs at Honolulu and Boulder.