Microsoft External Authentication Methods (EAM)
Beyond Identity phishing-resistant passwordless authentication for Microsoft Entra ID
Integrate Beyond Identity with Microsoft Entra ID using the External Authentication Methods (EAM) configuration for users to have phishing-resistant and passwordless authentication to Entra ID logons.
This guide covers the process of configuring Microsoft Entra ID and Beyond Identity. Each section contains instructions for that specific platform. View the overall summary in the list below.
- Set up configurations for Beyond Identity
- Register a new app in Microsoft Entra ID to configure EAM
- Configure API permissions for Microsoft Graph
- Validate administrator consent for Microsoft EAM
- Assign new identities in Beyond Identity
- Configure Microsoft conditional access policy
- User login verification for testing
Prerequisites
To get started with the integration, view the following prerequisites.
Microsoft Entra ID requirements
This information contains the necessary items for integrating with Beyond Identity.
- Microsoft Entra ID global administrator privileges
- Active Entra ID P1 license
- SCIM implementation for Microsoft Entra as upstream directory source to Beyond Identity
- View the Generic SCIM for more information.
Beyond Identity requirements
The list below covers the basic Beyond Identity requirements for the integration.
- Secure Access Tenant with Super Admin Role
- Use an existing account, or sign up here to create a new Beyond Identity account
- Have at least two devices and two Super Admin roles configured*
- *Recommended, optional
Steps
Follow the steps in the sections below to complete your integration for Beyond Identity and Microsoft EAM.
Legend
The sections below use these two color codings to identify the steps for separate platforms. Use a separate browser window when following instructions for each platform.
🔵 Beyond Identity - Beyond Identity platform tasks are highlighted in blue.
🟠 Microsoft Entra ID - Microsoft EAM platform tasks are highlighted in orange.
🔵 Set up Beyond Identity console
The following section covers the 🔵 Beyond Identity console and related steps. For convenience, use a separate browser window for this section.
- Navigate to your Beyond Identity console.
- On the left-hand navigation under Access Control, click Applications.
- Select the Browse Applications tab.
- Click Entra ID (External Authentication Methods).
- Click Add OIDC.
- Under General, update the Display Name text field.
- Click Save Changes at the top of the page.
- Scroll down to Client Information & Endpoints.
- Copy the Issuer Endpoint value. This is for registering a new app in Microsoft Entra ID.
🟠 Register new app in Microsoft Entra ID
The steps below are for configuring a new app registration in 🟠 Microsoft Entra ID. Follow the instructions in this section using a separate browser window.
- Navigate to your Entra ID platform.
- On the left-hand navigation under Manage, click App Registrations.
- Click + New Registration at the top of the page.
- Under the Name section, update the user-facing display name in the text field.
- Under supported account types, select Accounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant).
- Under Redirect URI (optional) → Select a platform dropdown, select Web.
- Paste the Issuer Endpoint value from the Client Information & Endpoints of Step 8 of the previous section into the Redirect URI text field.
- Click Register.
🟠 Enable ID tokens for flows
The steps in this section go over enabling ID tokens for authentication after registering a new application.
- Under the new application's registration page and the Manage section, click Authentication.
- Scroll to the Implicit grant and hybrid flows section.
- Check the box for ID tokens (used for implicit and hybrid flows).
- Click Save.
🟠 Configure API permissions for Microsoft
This section contains the instructions for updating permissions in 🟠 Microsoft Entra.
- On the left-hand navigation under Manage, click API permissions.
- Under Configured permissions, click + Add a permission.
- On the Request API permissions page, click Microsoft Graph.
- On the Microsoft Graph permissions page, click Delegated permissions.
- Scroll down the Select permissions section pop up.
- Under the Permission table column, click the checkboxes for
openid
andprofile
. - Click Add permissions at the bottom of the page.
🟠 Create a Microsoft external method and validate consent
The steps below cover setting up important values in 🟠 Microsoft Entra ID for Beyond Identity validation after registering the new application.
- While on the new application landing page, on the left-hand navigation, click Overview.
- Under the Essentials section, copy the Application (client) ID value.
- Navigate to the platform home page for your organization.
- On the left-hand navigation under Manage, click Security.
- On the Security page under Manage, click Authentication methods.
- On the Authentication methods page, click + Add external method (Preview).
- Under the Method Properties section, input the name in the Name* field.
- Paste the Application (client) ID value from Step 2 in the text field for App ID*.
🟠🔵Copy values from Beyond Identity to Microsoft and request consent
Follow the steps below to copy important values from 🔵 Beyond Identity and paste them into 🟠 Microsoft Entra ID.
- From 🔵 Step 8 of the Set Up Beyond Identity console section, copy the Client ID value.
- 🟠 Go back to the Method Properties section in Microsoft Entra and paste the Client ID value from the previous step in the Client ID field.
- From 🔵 Step 9 of the Beyond Identity console configuration section, copy the Discovery Endpoint value.
- 🟠 In Microsoft Entra, go back to the Method Properties section and paste the value from the previous step into the Discovery Endpoint field.
- Next to Request admin consent, click Request permission. This prompts the Microsoft account account login. Administrator privilege is required to request permissions.
- Login to the account and click Accept.
🟠 Add directory member groups to configuration
As 🟠 Microsoft validates administrator consent, these steps are for adding targets of existing users.
- Under the Enable and target section, click + Add target ⌄ for the dropdown menu.
- Click Select targets.
- On the Add directory members page, use the search field to find the user group for the login configuration.
- Click the checkbox to select that group.
- Click Select at the bottom of the page.
- On the Add external method (Preview) page and under the Enable and target section, toggle Enable to On.
- Click Save at the bottom of the page.