Microsoft Azure AD is a robust identity solution for businesses, offering convenient single sign-on, multi-factor authentication, and conditional access to enhance security measures against cyber threats.
Today we are excited to announce that we now support using Azure AD with OpenID Connect using Grafbase Auth.
Here's how simple it is to setup inside grafbase/schema.graphql
:
schema
@auth(
providers: [{ type: oidc, issuer: "{{ env.ISSUER_URL }}" }]
rules: [{ allow: private }]
) {
query: Query
}
Make sure to set the issuer
value using an environment in your project dashboard.
You can also set the environment variable when using the Grafbase CLI inside the file grafbase/.env
:
ISSUER_URL=https://login.microsoftonline.com/[tenantId]/v2.0
OpenID Connect (OIDC) is an authentication protocol that builds upon the OAuth2 protocol — learn more about working with OIDC and Azure AD.
We'd love to hear your feedback and ideas, so join us on Discord.