Microsoft Azure Authentication


VitalSource needs few pieces of information to integrate with Microsoft Azure:

  • Application (Client) ID

  • Directory (Tenant) ID

  • Client Secret Value

  • OAuth 2.0 authorization endpoint (v2)

  • OAuth 2.0 token endpoint (v2)

  • OIDC Userinfo Endpoint

  • Scope

Setup Instructions

  • Login to your Azure Portal as an administrator
  • Navigate to the App Registrations page and select New registration
    • Enter the following on the Registration page and then click Register

      • Name: VitalSource

      • Supported account types: Select “Accounts in this organizational directory only”

      • Redirect URI:

    • Create a Client Secret for the newly created VitalSource application

      • Click Certificates and Secrets

      • Under Client secrets click New client secret

      • For Description add “VitalSource Integration”

      • Expires: Select “Custom” and then enter:

        • Start: Today’s date

        • End: Longest date possible (typically 3 years)

          • Please note when this Client Secret expires the integration will stop working so you will need to provide VitalSource with a new Client Secret before this one expires in the future so users service is not interrupted

    • Provide VitalSource with the following data points to complete the integration

      • Application (client) ID: Found in the Overview tab under Essentials section

      • Directory (tenant) ID: Found in the Overview tab under Essentials section

      • Client Secret Value: Found in the Certificates and secrets tab

      • OAuth 2.0 authorization endpoint (v2): Found in the Endpoints tab

      • OAuth 2.0 token endpoint (v2): Found in the Endpoints tab

      • OIDC Userinfo Endpoint: Should always be:

      • Scope: Should always be openid

    • Share the above information with your VitalSource Integration Manager using 


    Microsoft documentation: 

Was this article helpful?
0 out of 0 found this helpful



Please sign in to leave a comment.