diff --git a/containers/backupchecks/src/backend/app/main/routes_documentation.py b/containers/backupchecks/src/backend/app/main/routes_documentation.py index 66c2f16..718f9b6 100644 --- a/containers/backupchecks/src/backend/app/main/routes_documentation.py +++ b/containers/backupchecks/src/backend/app/main/routes_documentation.py @@ -89,6 +89,7 @@ DOCUMENTATION_STRUCTURE = { {'slug': 'general', 'title': 'General Settings'}, {'slug': 'mail-configuration', 'title': 'Mail Configuration'}, {'slug': 'autotask-integration', 'title': 'Autotask Integration'}, + {'slug': 'entra-sso', 'title': 'Microsoft Entra SSO'}, {'slug': 'reporting-settings', 'title': 'Reporting Settings'}, {'slug': 'user-management', 'title': 'User Management'}, {'slug': 'maintenance', 'title': 'Maintenance'}, diff --git a/containers/backupchecks/src/templates/documentation/settings/entra-sso.html b/containers/backupchecks/src/templates/documentation/settings/entra-sso.html new file mode 100644 index 0000000..3f941bf --- /dev/null +++ b/containers/backupchecks/src/templates/documentation/settings/entra-sso.html @@ -0,0 +1,94 @@ +{% extends "documentation/base.html" %} + +{% block doc_content %} +

Microsoft Entra SSO

+

Use Microsoft Entra ID (Azure AD) to let users sign in with their Microsoft account.

+ +
+ Scope: this page explains the setup for Backupchecks and Microsoft Entra. + It does not replace your internal identity/security policies. +
+ +

Prerequisites

+ + +

Step 1: Register an app in Microsoft Entra

+
    +
  1. Open Microsoft Entra admin centerApp registrations.
  2. +
  3. Create a new registration (single-tenant is typical for internal use).
  4. +
  5. Set a name, for example Backupchecks SSO.
  6. +
  7. After creation, copy: + +
  8. +
+ +

Step 2: Configure redirect URI

+
    +
  1. In the app registration, open Authentication.
  2. +
  3. Add a Web redirect URI: + +
  4. +
  5. Save the authentication settings.
  6. +
+ +

Step 3: Create client secret

+
    +
  1. Open Certificates & secrets in the app registration.
  2. +
  3. Create a new client secret.
  4. +
  5. Copy the secret value immediately (it is shown only once).
  6. +
+ +

Step 4: Configure Backupchecks

+
    +
  1. Open Settings → Integrations → Microsoft Entra SSO.
  2. +
  3. Enable Microsoft sign-in.
  4. +
  5. Fill in: + +
  6. +
  7. Optional: enable Auto-provision unknown users as Viewer.
  8. +
  9. Save settings.
  10. +
+ +

Step 5: Test sign-in

+
    +
  1. Open /auth/login in a private/incognito browser session.
  2. +
  3. Click Sign in with Microsoft.
  4. +
  5. Authenticate with an allowed account.
  6. +
  7. Confirm you are redirected back into Backupchecks.
  8. +
+ +

User mapping behavior

+ + +

Troubleshooting

+ +{% endblock %} +