External Token Providers
External token providers are OIDC identity providers that issue JSON Web Tokens (JWTs) when a user authenticates using an application client. After receiving a JWT from the external token provider, the client application uses Dremio token exchange to obtain an OAuth access token used to create connections to Dremio.

The OIDC external token provider does not need to be the same identity provider used by the Dremio console for single sign-on (SSO). The provider requires an application registration specifying the OAuth authorization flow to be used between the external token provider and the client to obtain the JWT that will be sent to Dremio.
This page outlines the steps for configuring an external token provider so Dremio can interpret and validate the JWTs issued by your provider.
The OIDC specification describes the content of the JWT and the authorization process. Claims in a JWT contain information asserted about a subject. They are key/value pairs in which the key is a string, and the value can be any JSON type (a string, a number, a boolean, an array, or a JSON object).
Example: External JWT Claims from Microsoft Entra ID{
"aud": "0853fce0-c748-4c54-aa58-f5b9af279840",
"iss": "https://login.microsoftonline.com/3e334762-b0c6-4c36-9faf-93800f0d6c71/v2.0",
"upn": "gnarly@dremio.com"
}
Prerequisites
Before setting up External Token Providers, ensure you have:
- Dremio admin privileges or the CONFIGURE SECURITY privilege.
- An OIDC-compliant Identity Provider configured with an application registration for your client.
- Access to the following information from your IDP:
- Audience – Application ID or resource URI
- User claim mapping – The claim containing the Dremio username
- Issuer URL – Identity provider identification
- JWKS URL – Optional location of public keys
Define an External Token Provider
Dremio requires the following configuration values from your OIDC identity provider.
The examples below are specific to Microsoft Entra ID. Your identity provider may require additional configuration of a client application registration that depends on the OAuth authorization flow used between your client and your provider. To configure your application registration, consult your identity provider documentation.
Audience
The audience value identifies the intended recipients of the external JWT. It can generally be an array of case-sensitive strings or URI values. The audience is contained in the aud claim in the external JWT.
When using Microsoft Entra ID, the audience can be the Application ID assigned to your app in the Microsoft Entra ID portal or the resource URI. In v2.0 tokens, this value is always the Application ID. In v1.0 tokens, it can be the Application ID or the resource URI used in the request, depending on how the client requested the token. Dremio supports v1.0 and v2.0 JWTs from Microsoft Entra ID.
Example Audience Claim with Microsoft Entra ID Application ID"aud": "0853fce0-c748-4c54-aa58-f5b9af279840"
User Claim Mapping
The user claim mapping identifies the claim in the external JWT that contains the Dremio username.
When using Microsoft Entra ID authentication, Dremio usernames must align with the User Principal Name (UPN) claim for correct linking of user group memberships via the Azure Graph Client.
When a user is added to a Power BI workspace, the user's identity is also represented by the User Principal Name (UPN), which has the format of an email address.
The JWT contains the UPN claim, named upn, and its value.
"upn": "gnarly@dremio.com"
The user claim mapping field of the external token provider requires the name of the claim used in the JWT, which in this case is upn.