Configuring Microsoft Entra / Azure AD SSO for Vantage

Modified on Fri, 30 Jan at 10:29 AM

Configuring Microsoft Entra / Azure AD SSO for Vantage

This guide walks customer engineers through the steps to configure Microsoft Entra (formerly Azure Active Directory) as an Identity Provider (IdP) for federated Single Sign-On (SSO) into the Vantage platform.


Step 1: Register the Vantage Application in Microsoft Entra

To enable SSO, you must register Vantage as an application in your Microsoft Entra / Azure AD tenant.

Follow Microsoft’s official guide for registering an application:


? Quickstart: Register an application with the Microsoft identity platform


During Registration:

Specify the appropriate redirect URI depending on the environment:

Sandbox (QA) Environment

  • Redirect URI:
    https://auth-qa.npi-digital.com/login/callback

  • Login URL (for reference):
    https://qa.npi-digital.com

Production Environment

  • Redirect URI:
    https://auth.npi-digital.com/login/callback

  • Login URL (for reference):
    https://www.npi-digital.com

⚠️ We recommend testing in the Sandbox environment before enabling SSO for Production.


Step 2: Share Required Details with the Vantage Team

Once registration is complete, please provide the following information:

  • Microsoft Azure AD / Entra domain (e.g., yourcompany.onmicrosoft.com)
    (Provide separate domains for QA and Production if different)

  • Client ID

  • Client Secret (securely shared—do not send over email)

  • Additional domains you’d like to support (optional)


Need Help?

If you encounter issues or need assistance, contact your Vantage implementation engineer or reach us at support@npi-digital.com.



Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article