Skip to main content
Skip table of contents

Setting up Yotascale Entra ID

How to setup Yotascale Entra ID

Currently Yotascale provides support for Microsoft Entra ID, Google Auth, SAML (through Okta or Ping Identity) or Okta OpenID authentication in addition to username/password logins. Google Auth can be used alongside any 1 of the other Authentication Providers. Adding Entra ID, SAML or OpenID will override the username/password authentication. This guide focuses on setting up Microsoft Entra using Yotascale's Microsoft Entra ID authentication provider.

Yotascale - Retrieve Entra ID auth data:

  1. Login to Yotascale with a user that has Admin role access

  2. Go to the Settings Menu

  3. Under Users and Permissions select Manage Auth Providers

  4. Select "+ New Provider"

  5. Select Microsoft Entra ID

  6. Enter an Organization name

  7. At bottom of page copy and save the Redirect URL:

  8. Leave this page open

Microsoft Entra ID - Create Application

  1. Login to Microsoft Entra - https://entra.microsoft.com/

  2. Select Application Tab and then App registration

  3. Select "New Registration"

  4. In the new window enter user facing name “Yotascale App”

  5. Select supported account types

  6. In Redirect URI, Select a platform as “web”

  7. enter the saved Redirect URL copied from Yotascale

  8. Select "Register"

  9. Select Application Tab and then App registration again

  10. Select “All Applications” Tab

  11. Selected the application “Yotascale App” (newly created app)

  12. Copy and save the application (client) id

  13. Click on “Add a certificate or secret

  14. In the client secret page, Click on “New client secret”

  15. Add description and expiry based on your company policy and then click “add” button

  16. Copy and save the client value

  17. Now click “Overview” from the side panel and copy and save the “primary domain”

Yotascale - Complete Okta OpenID Auth Provider configuration

You should still be logged in and on the Microsoft Entra ID Provider configuration page

If not, login again to Yotascale with a user that has Admin role access

Follow the same steps to add new Microsoft Entra ID provider as describe  above.

Make sure to add the same Organization name

Enter the following information:

  1. Organization name already entered

  2. Microsoft Entra ID domain - Enter the primary domain that was copied from Entra application

  3. Application (Client) ID: Enter the application (client) Id that was copied from the Entra application

  4. Client Secret - Enter the Client Secret that was copied from the Entra application

  5. Auto Provisioning

    1. Make sure this is Enabled - When user authenticates through Okta, the user account will automatically be created in Yotascale User list.

  6. Active - Make sure this is Enabled, if it is disabled this Auth Provider will not be used at login.

  7. Default Group - when a user first logs into Yotascale, they will be automatically added to this User Group

  8. Select “Add Auth Provider”

Configuration is now complete and users should be able to login via Okta successfully.

If you run into any issues, please contact our support team.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.