Login into the Dashboard using Azure AD - Guide

Last updated: 4 minutes read.

This is an end-to-end worked example of how you can use AzureAD and our Tyk Identity Broker (TIB) to log in to your Dashboard. This guide assumes the following:

You already have authorized access to Tyk’s Dashboard. If you haven’t, get the authorization key by following this guide.

Azures’s side

  1. Access your Azure Portal and navigate to the Azure Active Directory page.
  2. Go to app registrations and create or access an application you want to use for Dashboard access.
  • If you are creating an application, give it a name and register it
  1. Add a redirect URL to your application as callback to TIB in your Azure application:
  • In your app, either via the Authentication menu or the redirect URL shortcut navigate to and add the redirect to TIB in the Web category i.e. http://localhost:3000/auth/{PROFILE-NAME-IN-TIB}/openid-connect/callback.

    Redirect URL

  1. Go to Overview and add a secret in Client Credentials. Don’t forget to copy the secret value, not the secretID.


Check Microsoft’s documentation for more detail.

Dashboard’s side

  1. Log in to your dashboard and select Identity Management, located under System Management
  2. Create a profile and select OpenID Connect as the provider type
  3. Under Profile Configuration, paste the secret value, clientID, and well-known endpoint URL from the Azure site.
  • Profile Configuation may look something like this:

Profile Configuration

  • The well-known endpoint URL is created by Azure and can be located by selecting Endpoints on their site


Test your Azure Login:

From the browser call http://localhost:3000/auth/{PROFILE-NAME-IN-TIB}/openid-connect

  • If it’s working you’ll be redirected to Azures’s web page and asked for your username and password.



  • If it’s working you’ll be redirected to Azures’s web page and asked for your username and password.



Once it’s working you can also add more enhancements such as automatic user group mapping from your AzureAD security groups or users groups to Tyk Dashboards groups.

User group mapping

Group mapping can be managed from Advanced Settings section of the Profile Configuration screen.

Profile Configuration - Additional Options

As illustrated in the screen below the following information must be provided:

  • Identity provider role
  • Tyk User Group: This can be created from the User Groups section of the dashboard (reference a link to a page in tyk docs here to show how to create a user group). When creating your User Group, one can also select and adjust the permissions for each group.

For more information on how to set and change user permissions, head to this guide

Profile Configuration - Raw-editor

You can select the scopes you would like your request to include. By default, Tyk will provide the connectid scope, anything additional must be requested.

OpenID Connect Example

For debugging purposes, you can find an example we created using the OpenID Connect playground.

  1. Add the redirect url found on the OpenID Connect site to the redirect urls found under the Web section

Access redirect urls

Additional URL Added

  1. Copy the OpenID Connect endpoint from the Azure site
  2. On the OpenID Connect site select Edit. In the Server Template dropdown menu select the Custom option and paste the endpoint in the Discovery Document URL.

Edit Button

Custom Dropdown

  1. Press the Use Discovery Document button and this will autofill Authorization Token Endpoint, Token Endpoint, and Token Keys Endpoint

Discovery Document

  1. Copy and paste the Client ID and Client Secret from the Azure site to your ConnectID. Scope is autofilled for you and save the configuration.

Client ID and Secret

6. Press start at the bottom of the Request window and if done correctly, this should prompt you to sign in to your Azure account.

OpenID Connect Step 2

7. You should then be redirected back to OpenID Connect where you’ll be shown the Exchange Code. This needs to be turned into an access token. Press the exchange button under the request and then press Next.

OpenID Connect Step 3

OpenID Connect Step 4

8. We can then verify this by pressing the verify button. We can also view the information or scope of what is being returned by heading to jwt.io and viewing the payload: data there.

OpenID Connect Step 5

9. We are given an object with key, value pairs and we can pass in the key ie. name to our Custom User Group and the value of to our Identity Provider Role in our Tyk dashboard as shown in the example above.

OpenID Connect Step 6

To try this yourself, we have included the link: https://openidconnect.net/