Microsoft Entra ID Configuration

Enterprise

Bacula Enterprise Only

This solution is only available for Bacula Enterprise. For subscription inquiries, please reach out to sales@baculasystems.com.

Microsoft Entra ID (formerly Azure Active Directory) is Microsoft’s cloud identity and access service for workforce and application authentication. It provides centralized identity governance, Single Sign-On (SSO), and conditional access, and it supports OpenID Connect and OAuth 2.0 for modern web applications such as BWeb.

The following steps configure Microsoft Entra ID as an OIDC identity provider for BWeb.

Application

Create an application registration that represents BWeb.

  1. Sign in to the Azure Portal: https://portal.azure.com/auth/login/

  2. Navigate to Microsoft Entra ID > Manage > App registrations > New registration.

  3. Enter a name such as BWeb or Bacula Enterprise.

  4. Set the supported account type (typically “Accounts in this organizational directory only”).

  5. Under Redirect URI, set Platform to Web and URI to https://[bweb.ip.or.hostname]/oauth2/callback.

Use the exact public BWeb URL. Mismatched protocol, hostname, or path is one of the most common causes of failed sign-in loops.

../../../../../_images/entraid-register-step1.png

Client Secret

Create a client secret for the application.

  1. Open the application and navigate to Manage > Certificates & secrets.

  2. Click New client secret.

../../../../../_images/entraid-add-secret.png

After creating the secret, copy its value and store it securely. It will be used as client_secret during BWeb configuration.

Important: Microsoft Entra ID only shows the full secret value once, at creation time.

../../../../../_images/entraid-list-secret.png

Token Claims

Add group information to the token so BWeb can map roles.

  1. Go to Manage > Token configuration.

  2. Click Add groups claim.

  3. Select Directory roles (selecting Security is optional).

  4. Save.

If your organization uses group-based access (recommended), include group claims so BWeb can map Bacula Admins and bacula_* roles correctly.

../../../../../_images/entraid-token-groups.png

The claim should appear in the list:

../../../../../_images/entraid-token-groups-list.png

Application Values

Open Manage > Overview and record the values needed to configure BWeb:

  • Application (client) ID -> client_id

  • Directory (tenant) ID -> used to build oidc_issuer_url and oauth2_logout_url

Common URL formats for Entra ID:

  • oidc_issuer_url: https://login.microsoftonline.com/[tenant-id]/v2.0

  • oauth2_logout_url: https://login.microsoftonline.com/[tenant-id]/oauth2/logout

../../../../../_images/entraid-app-registration-properties.png

Access Group

Associate the users who should access BWeb with the application.

  1. Create a group under Microsoft Entra ID > Manage > Groups.

  2. Add the target users to the group.

../../../../../_images/entraid-groups.png

Depending on your Entra ID configuration, the token may contain group IDs rather than names. If so, you must create an ID-to-name mapping for BWeb. See BWeb Internal Group Matching.

Once the IdP configuration is complete, continue with Installation and Deployment.

Go back to: Authentication via OpenID Connect/OAuth 2.0 and Single Sign-On.