Configuring Microsoft Entra / Azure AD SSO for Vantage
This guide walks customer engineers through the steps to configure Microsoft Entra (formerly Azure Active Directory) as an Identity Provider (IdP) for federated Single Sign-On (SSO) into the Vantage platform.
Step 1: Register the Vantage Application in Microsoft Entra
To enable SSO, you must register Vantage as an application in your Microsoft Entra / Azure AD tenant.
Follow Microsoft’s official guide for registering an application:
? Quickstart: Register an application with the Microsoft identity platform
During Registration:
Specify the appropriate redirect URI depending on the environment:
Sandbox (QA) Environment
Redirect URI:
https://auth-qa.npi-digital.com/login/callbackLogin URL (for reference):
https://qa.npi-digital.com
Production Environment
Redirect URI:
https://auth.npi-digital.com/login/callbackLogin URL (for reference):
https://www.npi-digital.com
⚠️ We recommend testing in the Sandbox environment before enabling SSO for Production.
Step 2: Share Required Details with the Vantage Team
Once registration is complete, please provide the following information:
Microsoft Azure AD / Entra domain (e.g.,
yourcompany.onmicrosoft.com)
(Provide separate domains for QA and Production if different)Client ID
Client Secret (securely shared—do not send over email)
➕ Additional domains you’d like to support (optional)
Need Help?
If you encounter issues or need assistance, contact your Vantage implementation engineer or reach us at support@npi-digital.com.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article