Guide Index
Guides HomeMangoApps WebsiteCommunity & SupportBlog & Resources
MangoApps Integrations Guide
MangoApps Integrations Guide
  • 🥭Integrations
  • 🌐Analytics
    • Google Analytics
    • Integration with Tableau
  • 🌐Digital Signage
    • Digital Signage Integrations
    • Integration with Appspace
    • Integration with Monitors AnyWhere
    • Integration with Rise Vision
    • Integration with ScreenCloud
    • Integration with Yodeck
  • 🌐Events
    • Event Integration with Zoom
  • 🌐File Storage and Sharing
    • Integration with Adobe Experience Manager (AEM)
    • Integration with Box
      • Box as the File Storage
      • Box as External Document Repository
    • Integration with Dropbox
    • Integration with Google Drive
    • Integration with NetSuite
    • Integration with SharePoint
      • SharePoint Files and Federated Search
      • SharePoint Widget
  • 🌐HRIS Partner Integrations
    • 🆕HRIS Partner Integrations
    • Paylocity Integration
  • 🌐Single Sign-On
    • Single Sign-On Integrations
    • General Protocol Setups
      • Active Directory/LDAP
      • OAuth2.0
        • OAuth2.0 with Open ID Connect
      • SAML
    • SSO Integrations by Provider
      • SSO Integrations for ADP Workforce Now
        • Integration with ADP Workforce Now
      • SSO Integrations for Google Workspace
        • Google Cloud Identity
        • Integration with Google Enterprise using OAUTH 2.0
      • SSO Integrations for Microsoft
        • SCIM Setup for Microsoft Entra ID
        • Integrating Office 365 SSO Using OAuth2.0
        • Active Directory Federation Services
      • SSO Integrations for Okta
        • SCIM Setup for Okta
        • OAuth2.0 Setup for OKTA Using OpenIDConnect
      • SSO Integrations for OneLogin
        • SCIM Setup for OneLogin
      • SSO Integrations for UKG
      • SSO Integrations for Workday
  • 🌐Shifts & Schedules
    • Integration with Kronos
    • 🆕Integration with PDI Workforce
  • 🌐Widgets
    • Integration with MS Stream
    • Integration with Tagbox
  • 🌐Workspace
    • Integration with AirBrake
    • Integration with Freshdesk
    • Integration with GitHub
    • Integration with Huddle
    • Integration with JIRA
    • Integration with Microsoft Clarity
    • Integration into Microsoft Teams
    • Integration with OC Tanner
    • Integration with Pingdom
    • Integration with Power BI
    • Integration with Salesforce
    • Integration with Slack
      • Integration with Slack for Channel Notifications
    • Integration with Zendesk
  • 🌐ADDITIONAL RESOURCES
    • Submit a Support Ticket
    • Release Notes
Powered by GitBook
On this page
  • Overview
  • Required Roles
  • Provider Side Setup (Microsoft Entra ID / Azure Portal)
  • Note Down Key Details
  • MangoApps Side Setup
  • Testing Considerations
  • Security Considerations
  • End User Experience
  • Rollout Recommendations
  1. Single Sign-On
  2. SSO Integrations by Provider
  3. SSO Integrations for Microsoft

Integrating Office 365 SSO Using OAuth2.0

PreviousSCIM Setup for Microsoft Entra IDNextActive Directory Federation Services

Last updated 6 hours ago

Overview

MangoApps supports Single Sign-On (SSO) integration with Office 365 using the OAuth2.0 protocol. OAuth2.0 is a secure, open-standard framework for token-based authorization that allows external applications to access user data without exposing credentials.

By leveraging Office 365 (Microsoft Entra ID) as the OAuth2 provider, organizations can streamline user authentication, enhance security, and optionally enable Just-In-Time (JIT) provisioning to simplify user management.

This guide outlines the steps required to configure the integration both on the Office 365 (Entra ID) side and within MangoApps.


Required Roles

To complete the integration, ensure the following roles and access levels are available:

On Microsoft Entra ID (Azure) Side:

  • Global Administrator or Application Administrator to register and configure the application.

On MangoApps Side:

  • Domain Administrator or IT Admin with access to the Admin Portal for managing SSO settings.


Provider Side Setup (Microsoft Entra ID / Azure Portal)

To get starter, we will first need to register an application in Azure. Sign into the and navigate to Azure Active Directory > App Registrations.

Click New registration in the top menu.

Configure the items in the Register an application form as follows:

  • Name: Create name for your application

  • Supported account types: Choose based on your use case

  • Redirect URI: Select Web and enter:

    https://<yourdomain>.mangoapps.com/oauth2/complete

Click Register.


Next we will configure platform settings,

Under your newly registered app, go to Authentication.

Ensure the following options are checked:

  • Access tokens (used for implicit flows)

  • ID tokens (used for implicit and hybrid flows)

Now we will navigate to Certificates & secrets.

Click New client secret, set an expiration, and click Add.

Copy the generated Client Secret and store it securely.


Next, configure API Permissions

Go to API permissions.

Click Add a permission and select relevant Microsoft APIs to grant access to from the search or from scrolling the applications. Go to the Owners tab and grant admin permission as needed.


Note Down Key Details

These deatials will be used in subsequent steps for setup.

  • Client ID: From the app overview.

  • Client Secret: From the previous step.

  • Auth & Token URLs: These can be found under the app’s Endpoints tab or at:

    https://login.microsoftonline.com/{your_tenant_ID}/v2.0/.well-known/openid-configuration

MangoApps Side Setup

Log into the MangoApps Admin Portal and navigate to SSO > Connection > OAuth 2.0.

Click Add SSO Connection.

In the pop-up menu, fill in the following:

  • Provider: Select Office 365

  • Application Label: Give the connection a name.

  • Client ID & Secret: Enter the credentials generated in Azure.

  • Authorized Redirect URL:

    https://<yourmangodomain>.mangoapps.com/oauth2/complete
  • JavaScript Origins URL:

    https://<yourmangodomain>.mangoapps.com
  • Auth URL and Token URL: Use the endpoints from the Entra ID configuration.

(Optionally) Enable JIT Provisioning: This allows new users authenticated via Office 365 to be automatically created in MangoApps.

(Private Cloud / On-Premise Only) Use Enterprise Credentials:

  • Enable this setting if you're managing the Office 365 app registration yourself.

  • For shared cloud users, leave this disabled—MangoApps handles app registration.

Click Save and use the toggle bar to Enable the connection.


Testing Considerations

  • Test login with a sample user account in your Azure tenant.

  • Confirm correct redirection and access token generation.

  • Ensure user field mappings (email, first name, etc.) are syncing properly.

  • Validate that JIT provisioning works as expected if enabled.

  • Check that logout behavior redirects to your defined logout URL.


Security Considerations

  • Always store your Client Secret securely and rotate it periodically.

  • Use HTTPS for all callback URLs to prevent interception.

  • Assign least privilege permissions when adding API access.

  • For private cloud/on-prem customers, monitor token usage and enable enterprise credential validation.

  • Disable the connection immediately if a breach or misconfiguration is suspected.


End User Experience

  • Users will see an Office 365 login button on the MangoApps login page.

  • Upon clicking, they will be redirected to the Microsoft login screen.

  • After authentication, they are returned to MangoApps and logged in.

  • If JIT is enabled, new users from your domain will be created automatically on first login.


Rollout Recommendations

  1. Pilot with a Small Group:

    • Start with IT/admin users to verify stability.

    • Monitor login flows and provisioning.

  2. Document Internal Support Steps:

    • Prepare a quick reference for IT support teams on login troubleshooting.

  3. Notify End Users:

    • Share a guide or short video explaining the new login process.

  4. Gradual Rollout:

    • Enable Office 365 SSO for departments in phases.

    • Provide fallback login (password or other SSO methods) during transition.

  5. Monitor Usage:

    • Review logs in both MangoApps and Azure for successful and failed logins.

    • Adjust configuration as needed based on feedback.


For further details, refer to Microsoft’s documentation on .

🌐
Registering an Application
Azure Portal