Microsoft Secure Sign-In

Microsoft Secure Sign-In

Enable your employees to log in to RepairDesk using their Microsoft work accounts through Azure Active Directory (Azure AD). This improves security, reduces password management hassles, and simplifies onboarding for teams.

Overview

RepairDesk supports Microsoft Single Sign-On (SSO) using Azure Active Directory (Azure AD).
Once configured:

  1. Users can sign in using their Microsoft account credentials
  2. Administrators can centrally manage users from Azure AD
  3. Newly imported users can be assigned roles inside RepairDesk

This guide walks you through the full setup process.

Requirements

Before you begin, ensure you have:

  1. A Microsoft Azure Active Directory admin account
  2. Access to your RepairDesk account (Admin role)
  3. Ability to create an App Registration in Azure Portal

Step 1: Enable Microsoft Secure Sign-In integration

  1. Go to Settings > Integrations > Productivity >Microsoft SSO


  2. From the top-right, click Enable to start using the integration


  1. You'll automatically be redirected to the Setup tab

  2. Microsoft SSO is now enabled.


Step 2: Register RepairDesk as an Application in Azure Portal

  1. Go to Azure Portal and sign in:
    https://portal.azure.com

  2. From Azure Services navigate to Microsoft Entra ID page



  3. Click on Add > App registration


  4. On the Register an application page, enter an application name. 
    Select a Supported account, e-g  Accounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant)


  5. Click Register

Your application is now created.


Step 3: Add the Redirect URL

  1. Inside the application page, click Manage > Authentication in the left menu.


  2. Under “Redirect URL configuration” tab, click Add Redirect URL → Web


  3. Copy the Callback URL from your integration page under the Setup tab. 


  1. Paste the copied URL in the Azure portal and click Configure


  2. Your platform should now be shown in the list, 



Step 4: Configure Required API Permissions

  1. Go to API permissions in the left menu


  2. Click Add a permissionMicrosoft Graph


  3. Add the following:

    1. Application Permissions: User.Read.All


    2. Delegated Permissions: User.Read.All


After adding the permissions, click Grant admin consent


Step 5: Generate Application Credentials

  1. Go to Certificates & secrets page from the left panel



  2. Click New client secret


  3. Enter a description and choose an expiration option and click Add. 
    Note: Copy the Client Secret Value immediately — you will not be able to see it again.


  1. Next, go to Overview and copy the following:

    1. Application (client) ID → Client ID

    2. Directory (tenant) ID → Tenant ID

You will enter these in RepairDesk shortly.


Step 5: Connect Microsoft Secure Sign-In inside RepairDesk

  1. Go to the integration page enabled earlier, 

  2. Enter the following values from Azure:

    1. Client ID

    2. Tenant ID

    3. Client Secret

  1. Save the configuration


  2. Microsoft SSO is now connected


Step 6: Import Users from Azure Active Directory

  1. Navigate to Azure Users tab, you'll see a list of azure users here with their Azure Status



  2. Select users you want to sync into RepairDesk, and click Import Selected Users

  3. Once imported, the Exists in RD column will be marked as Yes



Step 7: Assign Roles to Imported Users (Mandatory)

After importing users:

  1. Go to Settings > Employees > Manage Employees

  2. Open each imported user

  3. Assign a Role (e.g., Admin, Manager, Cashier)


User Login Experience

Once setup is complete:

  1. Users go to the RepairDesk login screen

  2. Click Sign in with Microsoft

  3. They are redirected to Microsoft to authenticate

  4. Successful login redirects them back into RepairDesk


Troubleshooting & FAQs

1. A user cannot log in after SSO is configured

  • Ensure the user was imported first from Azure AD

  • Ensure the user has a role assigned inside RepairDesk

  • Ensure their Azure account is active

2. Getting a “Permission denied” error

Check if both Microsoft Graph permissions exist:

  • User.Read.All (Application)

  • User.Read.All (Delegated)
    Make sure Admin Consent was granted.

3. Login loop or redirect issues

Verify the Redirect URI is added exactly as provided — no slashes, typos, or trailing spaces.

4. Client Secret expired

Azure client secrets expire based on the duration selected.
Simply generate a new secret and update it inside RepairDesk.

5. Can I remove users from RepairDesk by removing them in Azure?

No. Removing a user in Azure won’t automatically remove them from RepairDesk.
You can manually disable or delete them from Settings > Manage Employees.


Need Help?

If you need assistance setting up Microsoft SSO, contact our support team via live chat or email. We’re here to help ensure everything is configured correctly.