Skip to content
Rishan Solutions
Rishan Solutions
  • PowerApps
  • SharePoint online
    • Uncategorized
    • Uncategorized
  • PowerAutomate
Rishan Solutions
Latest Posts
  • Agentic AI: The Dawn of Autonomous Intelligence Revolutionizing 2025 June 24, 2025
  • Recursive Queries in T-SQL May 7, 2025
  • Generating Test Data with CROSS JOIN May 7, 2025
  • Working with Hierarchical Data May 7, 2025
  • Using TRY_CAST vs CAST May 7, 2025
  • Dynamic SQL Execution with sp_executesql May 7, 2025

Using Microsoft Entra ID in Power Pages

Posted on April 15, 2025April 15, 2025 by Rishan Solutions

Loading

Power Pages supports authentication using Microsoft Entra ID (previously called Azure AD), enabling secure access for both internal (organization) and external users. This is crucial for building secure, role-based portals for employees, partners, and clients.

This guide breaks down the setup and usage of Microsoft Entra ID in Power Pages, step by step, including key components, configuration, use cases, and security best practices.


What is Microsoft Entra ID?

Microsoft Entra ID is Microsoft’s cloud-based identity and access management (IAM) service. It is a central part of Microsoft’s Entra product family and provides:

  • Authentication (login) for applications like Power Pages, Microsoft 365, and Azure.
  • Authorization and access control using roles and group assignments.
  • User management, including B2B (guest) and B2C (customer) users.

When used in Power Pages, Entra ID enables organizations to authenticate users seamlessly, enforce access control, and build secure experiences for different audiences.


Why Use Microsoft Entra ID in Power Pages?

Benefits include:

  • Single sign-on (SSO) across Microsoft services
  • Enterprise-grade security with MFA, conditional access
  • Seamless access for internal employees
  • Support for B2B guest users
  • Role-based access control through security groups
  • Audit logs and compliance features

Types of Entra ID Integration in Power Pages

Integration TypeUse CaseAuthentication Scope
Entra ID (Azure AD)Internal employeesOrganizational directory
Entra ID B2BPartners/contractorsExternal guest accounts in your tenant
Entra ID B2CPublic-facing portalsSupports Google, Facebook, etc. (More customizable UI)

Prerequisites

  • Access to Power Platform Admin Center
  • Access to Microsoft Entra Admin Center (https://entra.microsoft.com)
  • Appropriate privileges to register applications and configure authentication
  • Power Pages site created

Step-by-Step: Configuring Microsoft Entra ID in Power Pages

Step 1: Register an App in Microsoft Entra ID

  1. Go to https://entra.microsoft.com
  2. Navigate to “App registrations”
  3. Click “New registration”
  4. Enter a name (e.g., PowerPagesPortal)
  5. Set the Redirect URI to: arduinoCopyEdithttps://<yoursite>.powerappsportals.com/signin-aad
  6. Click Register

Step 2: Configure App Permissions

  1. Open the registered app
  2. Go to Authentication
    • Enable ID tokens (for OpenID Connect)
    • Ensure redirect URI is correct
  3. Go to API permissions
    • Add permission: Microsoft Graph > User.Read
    • Grant admin consent

Step 3: Create Identity Provider in Power Pages

  1. Open Power Pages > Design Studio
  2. Go to Set Up > Identity Providers
  3. Choose Microsoft Entra ID
  4. Fill in details:
    • Client ID: from app registration
    • Client Secret: create under “Certificates & secrets”
    • Issuer: bashCopyEdithttps://login.microsoftonline.com/<tenant-id>/v2.0
    • Redirect URL: same as earlier step
  5. Save configuration

Step 4: Test Login

  • Visit your Power Pages site
  • Click on Sign In
  • Choose Microsoft Entra ID
  • Login with an organizational or guest user account

Controlling Access with Web Roles

Once users authenticate via Entra ID, you can assign them Web Roles in Power Pages for access control.

Steps:

  1. Go to Portal Management App
  2. Navigate to Contacts
  3. Find the authenticated user (created automatically after first login)
  4. Assign one or more Web Roles (e.g., Authenticated Users, Administrators)
  5. Use Page Permissions to show/hide content based on these roles

Security Best Practices

  • Enable Multi-Factor Authentication (MFA) in Entra
  • Use Conditional Access to restrict IP/location
  • Use custom roles and groups to streamline access
  • Keep client secrets secure and rotate periodically
  • Review audit logs and monitor suspicious login attempts

Advanced Configurations

1. Using Microsoft Entra B2B for Partners

  • Invite external users via Entra ID > Users > New Guest User
  • They sign in using their own Microsoft or Gmail accounts
  • Enforce terms of use or restricted access through Conditional Access

2. Role-Based Access Using Entra Groups

  • Create security groups in Entra
  • Assign users to groups
  • Link Entra group membership to Dataverse table permissions via plugin or Power Automate

Troubleshooting Tips

IssueSolution
Redirect URI mismatchEnsure exact match in Entra App Registration
Login loop or errorCheck Issuer URL and Token type (OpenID)
User not created in portalEnable user creation and ensure correct claims mapping
No access after loginAssign correct Web Roles in Portal Management

Real-World Use Cases

  1. Employee Intranet Portal
    • Authenticate via Entra ID
    • Role-based access to HR policies, payroll data, internal news
  2. Vendor Portal
    • Invite vendors as guest users (B2B)
    • Share project files, invoices, and forms securely
  3. University Admin Portal
    • Use Entra for staff and B2C for students
    • Secure forms, grade submissions, and academic data
Posted Under Power Pagesapp registration Azure AD Conditional Access Dataverse Security Entra B2B Entra B2C External User Access Identity Providers Microsoft Entra ID Microsoft Identity Platform Portal Security Power Pages and Entra Integration Power Pages Authentication Power Pages Login Power Pages Web Roles Power Platform Security Single Sign-On

Post navigation

Embedding SharePoint documents
Integration with payment gateways (e.g., Stripe)

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Agentic AI: The Dawn of Autonomous Intelligence Revolutionizing 2025
  • Recursive Queries in T-SQL
  • Generating Test Data with CROSS JOIN
  • Working with Hierarchical Data
  • Using TRY_CAST vs CAST

Recent Comments

  1. Michael Francis on Search , Filter and Lookup in power apps
  2. A WordPress Commenter on Hello world!

Archives

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • March 2024
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • January 2022

Categories

  • Active Directory
  • AI
  • AngularJS
  • Blockchain
  • Button
  • Buttons
  • Choice Column
  • Cloud
  • Cloud Computing
  • Data Science
  • Distribution List
  • DotNet
  • Dynamics365
  • Excel Desktop
  • Extended Reality (XR) – AR, VR, MR
  • Gallery
  • Icons
  • IoT
  • Java
  • Java Script
  • jQuery
  • Microsoft Teams
  • ML
  • MS Excel
  • MS Office 365
  • MS Word
  • Office 365
  • Outlook
  • PDF File
  • PNP PowerShell
  • Power BI
  • Power Pages
  • Power Platform
  • Power Virtual Agent
  • PowerApps
  • PowerAutomate
  • PowerPoint Desktop
  • PVA
  • Python
  • Quantum Computing
  • Radio button
  • ReactJS
  • Security Groups
  • SharePoint Document library
  • SharePoint online
  • SharePoint onpremise
  • SQL
  • SQL Server
  • Template
  • Uncategorized
  • Variable
  • Visio
  • Visual Studio code
  • Windows
© Rishan Solutions 2025 | Designed by PixaHive.com.
  • Rishan Solutions