Azure Active Directory
SSO login with Microsoft accounts, automatic provisioning to private boards, and automated off-boarding when employees leave your Azure AD org.
Enterprise teams need access control that scales. If your organization uses Azure Active Directory (now Microsoft Entra ID), you can connect it to FeatureOS for single sign-on, automatic board provisioning, and automated off-boarding. Your IT team manages everything from the same place they manage every other tool.
Note: The Azure AD integration is available on the Business Plan.
What Azure AD + FeatureOS Gives You
Single Sign-On: Users see a "Continue with Microsoft" button on your FeatureOS portal. One click, and they are in with their existing Microsoft credentials. No separate account, no extra password. You can enable this alongside other authentication methods or restrict login to Microsoft accounts only.
Auto-provisioning to private boards: When someone signs in with Azure AD for the first time, they can be automatically added to specific private boards. This is how you handle internal feedback boards where only employees should have access, no manual invitations needed.
Automated off-boarding: When someone leaves your organization and gets removed from Azure AD, their FeatureOS access (Board, Admin, and Member roles) is revoked automatically. No security gaps from forgotten accounts, no manual cleanup.
Centralized identity management: New hires get access through their Microsoft account. Departing employees lose access automatically. Your IT team maintains one source of truth for identity.
How to Connect Azure AD to FeatureOS
- In FeatureOS, go to Dashboard > Organization Settings > Integrations.
- Click Connect under Azure Active Directory.
- Log in with your Azure AD Global Administrator account (ask your IT team if you do not have this access).
- Enable Consent on Behalf of Organization. This is mandatory for authenticated API calls to work.
- Configure your preferences:
- Select which private boards Azure AD users should be added to automatically.
- Set up off-boarding rules to revoke access when users are removed from Azure AD.
Users will now see Continue with Microsoft on your FeatureOS portal.
Azure AD Permissions Required by FeatureOS
The integration requests two scopes from Azure AD:
Directory.Read.All- Lets FeatureOS check when users are added or removed from your organization.offline-access- Lets FeatureOS perform configured actions (like off-boarding) on behalf of the connected administrator.
Why Enterprise Teams Use Azure AD with FeatureOS
IT teams manage access from Azure AD without maintaining a separate dashboard. Admins stop worrying about lingering access from former employees. And users get into your feedback portal with one click on their Microsoft account. Enterprise-grade access control that works without extra overhead.
Frequently Asked Questions
Common questions about the Azure Active Directory integration.
It connects FeatureOS with Azure Active Directory, allowing your users to log in with their Microsoft credentials and giving admins more control over access and off-boarding.
In FeatureOS, go to Dashboard → Organization Settings → Integrations → Azure AD → Connect, log in with a Global Administrator account, and enable “Consent on Behalf of Organization.”
Yes. You can choose which private boards Azure AD-authenticated users will be added to automatically.
If a user is removed from your Azure AD organization, their access to FeatureOS (Board, Admin, Member roles) is automatically revoked.
https://graph.microsoft.com/Directory.Read.All→ to fetch details about users added/removed in Azure AD.offline-access→ to perform configured actions on behalf of the connected user.
Yes. You can enable/disable authentication methods to restrict login to Microsoft accounts only.
Enterprise teams who want secure, centralized login management with automated user provisioning and off-boarding.
Can't find what you're looking for? Contact us at support@featureos.app