Setting up Yotascale Entra ID
How to setup Yotascale Entra ID
Currently Yotascale provides support for Microsoft Entra ID, Google Auth, SAML (through Okta or Ping Identity) or Okta OpenID authentication in addition to username/password logins. Google Auth can be used alongside any 1 of the other Authentication Providers. Adding Entra ID, SAML or OpenID will override the username/password authentication. This guide focuses on setting up Microsoft Entra using Yotascale's Microsoft Entra ID authentication provider.
Yotascale - Retrieve Entra ID auth data:
Login to Yotascale with a user that has Admin role access
Go to the Settings Menu
Under Users and Permissions select Manage Auth Providers
Select "+ New Provider"
Select Microsoft Entra ID
Enter an Organization name
At bottom of page copy and save the Redirect URL:
Leave this page open
Microsoft Entra ID - Create Application
Login to Microsoft Entra - https://entra.microsoft.com/
Select Application Tab and then App registration
Select "New Registration"
In the new window enter user facing name “Yotascale App”
Select supported account types
In Redirect URI, Select a platform as “web”
enter the saved Redirect URL copied from Yotascale
Select "Register"
Select Application Tab and then App registration again
Select “All Applications” Tab
Selected the application “Yotascale App” (newly created app)
Copy and save the application (client) id
Click on “Add a certificate or secret”
In the client secret page, Click on “New client secret”
Add description and expiry based on your company policy and then click “add” button
Copy and save the client value
Now click “Overview” from the side panel and copy and save the “primary domain”
Yotascale - Complete Okta OpenID Auth Provider configuration
You should still be logged in and on the Microsoft Entra ID Provider configuration page
If not, login again to Yotascale with a user that has Admin role access
Follow the same steps to add new Microsoft Entra ID provider as describe above.
Make sure to add the same Organization name
Enter the following information:
Organization name already entered
Microsoft Entra ID domain - Enter the primary domain that was copied from Entra application
Application (Client) ID: Enter the application (client) Id that was copied from the Entra application
Client Secret - Enter the Client Secret that was copied from the Entra application
Auto Provisioning
Make sure this is Enabled - When user authenticates through Okta, the user account will automatically be created in Yotascale User list.
Active - Make sure this is Enabled, if it is disabled this Auth Provider will not be used at login.
Default Group - when a user first logs into Yotascale, they will be automatically added to this User Group
Select “Add Auth Provider”
Configuration is now complete and users should be able to login via Okta successfully.
If you run into any issues, please contact our support team.