Skip to content

Entra ID Profiles – Configure Microsoft Entra ID (Azure AD) Connections

The Entra ID Profiles page manages connections to Microsoft Entra ID (formerly Azure Active Directory) for cloud-based user authentication. Each profile defines the tenant connection credentials, which user properties map to MideyeServer fields, how group membership is validated, and how phone numbers are formatted.

The list page displays a real-time connection status indicator for each profile. Configuration changes are validated live against the Entra ID tenant as you edit.

Required Role: ROOT, SUPER_ADMIN, or ADMIN (to create, edit, or delete profiles)

Navigation: Home → Directory Settings → Entra ID Profiles

RoleViewCreate / Edit / DeleteSearch User
ROOT
SUPER_ADMIN
ADMIN
OPERATOR
ColumnDescriptionVisibility
NameProfile name with live connection status indicatorAlways
Default Auth TypeDefault MFA method for users in this directoryDefault
ActionEdit, Delete, Search User buttonsAlways
ActionDescriptionRole Required
EditOpen the 5-tab edit formAdmin
DeleteDelete the profileAdmin
Search UserLook up a user in Entra IDAny authenticated

The form has five tabs and performs live verification against the Entra ID tenant.

Tenant connection credentials and default authentication settings.

FieldTypeRequiredValidationDefaultDescription
NameTextYesUnique (async check)Unique name for this profile
Tenant IDTextYesMicrosoft Entra ID tenant identifier
Client IDTextYesApplication (client) ID registered in Entra ID
Client SecretPasswordYesApplication client secret
Default Auth TypeSelectYesTOUCH_MOBILEDefault MFA method
Default Message TypeSelectYesFLASH_SMSOTP delivery method (FLASH_SMS or INBOX_SMS)

Maps Entra ID user properties to MideyeServer fields.

FieldTypeDefaultDescription
Mobile Phone PropertyTextmobilePhoneEntra ID property containing the mobile number
Token Number PropertyTextbusinessPhonesEntra ID property for hardware token number
Override DefaultsCheckboxOffEnable per-user auth type and message type from Entra ID
Auth Type PropertyTextpostalCodeEntra ID property for per-user auth type (disabled unless Override Defaults is on)
Message Type PropertyTextemployeeIdEntra ID property for per-user message type (disabled unless Override Defaults is on)

Controls group-based access restrictions.

FieldTypeDefaultDescription
Enable Group CheckCheckboxOffRestrict authentication to members of specified groups
Allowed Group IDsTextComma-separated Entra ID group IDs (disabled unless Group Check is on)
Enable RADIUS TranslationCheckboxOffEnable LDAP-to-RADIUS attribute translation for this profile

Automatic phone number formatting for Entra ID–sourced numbers.

FieldTypeDefaultDescription
Enable Phone Number Auto CorrectionCheckboxOffEnable automatic formatting
International PrefixText+46Country code prefix (disabled unless auto-correction is on)
Remove Leading ZeroCheckboxOffStrip leading zero from national numbers
Remove Parenthesis BodyCheckboxOffRemove content within parentheses

Account lockout settings for failed authentication attempts.

FieldTypeRequiredValidationDefaultDescription
Enable User LockingCheckboxNoOnLock accounts after excessive failures
Max Failed AttemptsNumberYesMin: 110Failed attempts before locking (disabled unless locking is on)
Minutes LockedNumberYesMin: 11Lock duration in minutes (disabled unless locking is on)

The Search User functionality navigates to a dedicated search page where you can look up users in the Entra ID tenant.

Steps:

  1. Click the Search User icon for the target profile.
  2. Enter a user principal name (e.g., user@domain.com).
  3. View the user’s properties including name, phone numbers, group memberships.
  1. In the Azure portal, register an application and grant User.Read.All and Group.Read.All permissions.
  2. In MideyeServer, click Add New.
  3. Enter the Tenant ID, Client ID, and Client Secret from the Azure app registration.
  4. Set the default authentication type.
  5. Save — the live verification confirms connectivity.
  1. Edit the Entra ID profile.
  2. Go to the Group Check tab.
  3. Enable Enable Group Check.
  4. Enter the Entra ID group object IDs (comma-separated).
  5. Save. Only members of the specified groups can authenticate.
  1. Edit the profile.
  2. Go to the User Properties tab.
  3. Enable Override Defaults.
  4. Specify the Entra ID properties that contain per-user auth types.
  5. Save. MideyeServer reads auth types from the specified properties instead of using the default.
IssuePossible CauseResolution
Connection indicator redInvalid tenant ID, client ID, or secretVerify Azure app registration credentials
User not foundUser principal name incorrect or user not in tenantCheck the exact UPN in the Azure portal
Group check blocks valid usersWrong group IDsVerify group object IDs in the Azure portal
Phone number format issuesNumbers stored inconsistently in Entra IDEnable phone number auto-correction
Users locked unexpectedlyLow max failed attempts thresholdIncrease the threshold on the User Locking tab