Azure Active Directory SSO Setup Guide
At FSH Tech, we integrate with cloud providers for SSO for security best practices. By doing so, we never store any passwords on our end. We also refrain from storing user data such as names and emails. Instead, we opt to get this data from cloud providers, thereby significantly reducing harm in any potential data breach.
Below are steps outlining the setup that happens in the Azure directory.
Step 1: Register Application in Azure AD
1.1 Create an App Registration in Active Directory
- Go to https://portal.azure.com
- Sign in with your organizational account
- Navigate to Azure Active Directory → App registrations
- Click “New registration”
1.2 Configure Application Registration
Fill out the registration form with these details:
Name: FSH Tech - PPS Child Nutrition Software
Supported account types:
- Accounts in this organizational directory only: Only users in your organization will be able to log into our platform.
Redirect URI:
- Platform: Single-page application (SPA)
- URI:
http://pps.fshtechnologies.org/
1.3 Note Important Values
After registration, save these values from the Overview page:
- Application (client) ID:
xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx - Directory (tenant) ID:
xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
These values will need to be given to us prior to go-live.
Step 2: Configure API Permissions
We only ask for basic, necessary permissions. We require the ability to access a user’s profile (including name) and email so users can see who they are signed in as and are able to receive transactional emails (such as reminders).
If further access permissions are required, we will communicate what that data is used for.
2.1 Add Microsoft Graph Permissions
- Navigate to API permissions in the left sidebar
- Click “Add a permission”
- Select Microsoft Graph → Delegated permissions
- Add these permissions:
User.Read(default)openidprofileemail
Step 3: Configure Admin Consent
By granting Admin Consent, you are essentially approving that this application is acceptable to log into for your organization. While this step is technically optional, we find that users can be concerned and raise alarm if consent is not pre-approved. If there’s any concerns about granting admin consent, we are happy to hop on a call and talk more about it.
3.1 Grant Admin Consent
- After adding permissions, click “Grant admin consent for [Your Organization]”
- Click “Yes” to confirm
- Verify all permissions show “Granted for [Your Organization]“
Step 4: Configure Token Settings
By configuring token settings, you are allowing us to grab the below permissions on authentication. These are basic profile information that we use to display to the user that they are logged in and to send them transactional emails. We do not share any of this data with third parties and we do not send any marketing emails to our users.
4.1 Token Configuration
- Navigate to Token configuration in the left sidebar
- Click “Add optional claim”
- Select ID token type
- Add these claims:
emailgiven_namefamily_namepreferred_username
- Click “Add” and accept any additional permissions if prompted