Microsoft Entra ID SSO for Proxmox
Microsoft Entra ID SSO for Proxmox
This guide shows how to configure Proxmox VE to use Microsoft Entra ID through OpenID Connect (OIDC).
What this integration does
This setup enables Microsoft-based sign-in to the Prerequisites:Proxmox web interface Abilitythrough an OIDC realm.
It does not automatically replace all node-level Linux authentication paths. Authorization inside Proxmox still needs to be designed separately.
Prerequisites
Proxmox allows various external authentication services via protocols such as Active Directory, LDAP or OpenID Connect. We will use the latter for thein Microsoft Entra ID
Limitations
Proxmox allows the automatic creation of user objects, but is otherwise relatively limited compared to other applications, as it does not use the OAUTH 2.0 standard but only handles logins via Open ID Connect. These certain limitations must be taken into account when introducing this setup.
In addition, logins will only be possible for the Webgui. The login on the individual cluster nodes is still regulated via the Linux authentication of the individual hosts. This means that no console connections can be made to the host shells with the Microsoft Entra ID user objects.
Create App Registration
First, an app registration including client secret must be created in Microsoft Entra ID. All settings can be left at the default values. Important settings are the Redirect URIs under the Authentication tab. Set these URIs to your external
Step be1: used for Microsoft Entra ID to know where to redirectCreate the userapp inregistration
Recommended of successful logins.settings:
Authentication Type:Platform: Web- Redirect
URIs:URI:https://proxmox.yourdomain.com/use the exact URL expected by your Proxmox OIDC realm configuration
AddRecord the correspondingTenant permissionsID, forClient OpenID Connect as delegated permissionsID and grantClient adminSecret.
Step for2: yourAdd tenant.basic sign-in scopes
Typical scopes:
Permissions:openid
profile
email
Use group claims only if your authorization design requires them.
Step 3: Create a client secret for the applicationOIDC and save the tenant ID, application ID and client secret in your password manager. You can find instructions for this information here: Get app details and grant permissions to app registration
Setup Microsoft Entra IDrealm in Proxmox Realm
ThisTypical step requires the authentication details TenantID, ClientID, Client Secret from the first step.values:
In the Proxmox web interface select "Datacenter" -> "Realms" -> "Add" -> "OpenID Connect Server". There you can enter the credentials from Microsoft Entra ID. Enter the information as described here:
- Issuer URL:
https://login.microsoftonline.com/<yourtenantidtenant-id>/v2.0
Best frompractices
Summary
Microsoft Entra ID userwith object. The Access TokenProxmox is requesteda withsolid theseOIDC-based scopesSSO at login. The default values are usually sufficient.
After these settings are properly configured your users should be able to sign intoclear Proxmox webauthorization interface. After sign in the default grouping, roledesign and permissionsa mechanismstested fromfallback Proxmoxadmin take place.path.

