Microsoft Entra ID

Setup Okta to allow your employees to use GetTrusted.

Overview

You’ll register a new enterprise application in Microsoft Entra ID (Azure AD) and grant access for GetTrusted SSO.

Prerequisites

  • Admin access to the Azure portal.

  • Permission to create app registrations.

As you go through this save the 4 pieces of information as you will need it again for the directory services setup as the same data is needed.

Steps

1. Open Azure Portal

Go to portal.azure.com › Microsoft Entra ID › App registrations and click New registration.

2. Register the Application

  • Name: GetTrusted Enterprise

  • Supported account types: “Accounts in this organization only.”

  • Redirect URI (Web):

    https://enterprise.gettrusted.app/auth/oidc/callback
    https://enterprise.gettrusted.app/auth/oidc/mobile/callback

3. Save and Copy Application Details

After saving, note:

  • Application (Client) ID

  • Directory (Tenant) ID

4. Add Client Secret

Under Certificates & Secrets, select New Client Secret → choose an expiration period → Add. Copy the generated secret value immediately

5. Verify Redirect URIs

Navigate to the Authentication (Preview) page for your Integration you just created. Navigate to settings and ensure Allow public client flows is disabled, and ensure Access tokens and ID tokens are enabled.

6. Enter Values into GetTrusted

In GetTrusted › Settings › Authentication, fill:

  • Client ID

  • Client Secret

  • Tenant ID

  • Primary domain for your Microsoft tenant, this will generally be the email domain.

Click Save Connection. We will next start setting up.

Last updated