Skip to main content

Configure Microsoft Entra ID as an Identity Provider Enterprise

Dremio supports Microsoft Entra ID as an enterprise identity provider. Microsoft Entra ID administrators can follow these instructions to enable single sign-on (SSO) authentication and allow users to log in to Dremio using Microsoft Entra ID as the trusted third party.

Prerequisites

Configuring SSO in Microsoft Entra ID requires:

  • Privileges in Microsoft Entra ID that permit you to add, configure, and register applications.
  • The CONFIGURE SECURITY organization-level privilege or membership in the ADMIN role in a Dremio Enterprise account.

Configure an Application for SSO

To configure SSO in Microsoft Entra ID for Dremio users:

  1. In the Azure portal under Azure services, click the Microsoft Entra ID tile.

  2. In the left-navigation menu under Manage, click App registrations.

  3. Click New registration.

  4. Type a name for the application in the Name field.

  5. Select your desired account type in the Supported account types list. The default selection is Accounts in this organizational directory only (<your org> only - Single tenant).

  6. Under Redirect URI, in the Select a platform drop-down list, select Web and enter the following URI in the provided field:

  7. Click the Register button.

  8. Copy and save the value for the Application (client) ID. You will use it to configure authentication in Dremio later in this procedure.

  9. In the left-navigation menu under Manage, click Certificates & secrets.

  10. Click New client secret.

  11. In the Add a client secret panel, type a description for the secret in the Description field and select your desired lifespan for the secret in the Expires drop-down list.

  12. Click the Add button.

  13. Copy and save the value for the secret. The secret value is sensitive information and should be kept private. You will use it to configure authentication in Dremio later in this procedure.

  14. In the left-navigation menu under Manage, click API permissions.

  15. Confirm that the following permission is listed under API / Permissions name:

    • User.Read: Permits users to log in to the application, and permits the application to read the profiles and basic company information for logged-in users.
  16. Click Add a permission.

  17. In the Request API permissions panel, click the Microsoft Graph tile.

  18. Click the Delegated permissions tile.

  19. Under OpenId permissions, click the checkboxes next to the following options:

    • email: Permits the application to read users' primary email addresses.
    • openid: Permits users to sign in to the application with their work or school accounts and permits the application to view basic user profile information.
    • profile: Permits the application to view basic user profile information (name, avatar, and email address).
  20. Click the Add permissions button. The list of configured permissions should now include the following permissions:

    • email
    • openid
    • profile
  21. In the left-navigation menu under Manage, click Branding & properties.

  22. Copy and save the Publisher domain (<domain_name>.onmicrosoft.com). You will use it to configure authentication in Dremio later in this procedure.

  23. In the Dremio console, on the organization page, click next to the organization name.

  24. Click the Authentication tab in the left sidebar.

  25. In the Enterprise section, click Add Provider to open the Add Provider dialog.

  26. In Step 1, select Microsoft Entra ID in the dropdown list.

  27. In Step 3, enter the domain, client ID, and secret information that you copied from Microsoft Entra ID in the corresponding fields.

  28. Click Add. After the page loads, you should see Microsoft Entra ID listed as an authentication provider in the Enterprise section.

  29. Click the Enabled toggle to activate the Microsoft Entra ID authentication provider.

Entra ID is now configured as an enterprise authentication provider. The Log in with Microsoft Entra ID button appears in the list of log-in options for your Dremio users. Any Microsoft Entra ID user in your organization can use the Log in with Microsoft Entra ID button for SSO login.

Assign People and Groups to the Microsoft Entra ID Application

The Microsoft Entra ID application is configured to allow SSO login for any Microsoft Entra ID user in your organization. To adjust the application settings so that only users who are assigned to the app can use Microsoft Entra ID SSO to log in to Dremio:

  1. In the Azure portal under Azure services, click the Microsoft Entra ID tile.

  2. In the left-navigation menu under Manage, click Enterprise applications.

  3. Click the name of the SSO application.

  4. In the left-navigation menu under Manage, click Properties.

  5. Find the Assignment required? toggle and click Yes.

  6. Click Save.

With user assignment required, users who are not assigned to the application receive an error message from Microsoft when they try to use Entra ID SSO for Dremio.

Follow the instructions in the Microsoft Entra ID documentation to assign users and groups to your application.

Before the user can click Log in with Microsoft Entra ID in the list of log-in options for Dremio, one of the following conditions must be met:

  • The user has been invited by an admin and has activated their account through an email link.
  • An admin has set up SCIM provisioning and synced the user via SCIM.

Use privileges and roles to manage user access to objects in Dremio.

Use Microsoft Entra ID SSO to Log in to Dremio

To use Microsoft Entra ID SSO to log in to Dremio:

  1. Open the Dremio console login page:

  2. Type your email address in the Email field and click Continue.

  3. Click the Log in with Microsoft Entra ID button.

  4. You will be redirected to the Microsoft website for authentication.

  5. Microsoft Entra ID authenticates your identity and redirects you to Dremio, which then logs you in.

note

You can use the Microsoft Entra ID SCIM provisioning feature to sync groups and memberships from Microsoft Entra ID to Dremio and manage access for Dremio users and groups. To configure, follow Configure SCIM Provisioning with Microsoft Entra ID.

Revoke Microsoft Entra ID SSO Login for a User or Group

To revoke users' access to Microsoft Entra ID SSO login for Dremio:

  1. In Microsoft Entra ID, navigate to your application.

  2. Find the row for the user or group you want to deactivate and click to select the checkbox for the user or group.

  3. Click Remove.

  4. In the Do you want to remove these assignments? confirmation dialog, click Yes.

Starting immediately, the users cannot use Microsoft Entra ID SSO to log in to Dremio.

caution

If you revoke a user's access to use Microsoft Entra ID SSO login in Microsoft Entra ID and the user had created a Dremio password for login, they can still log in to Dremio with their Dremio username and password. To completely delete Dremio users so that they cannot log in to Dremio at all, you must also delete or deactivate the user through SCIM provisioning or manually remove their user accounts in Dremio.