Access & Security
Authentication Providers
Microsoft Entra ID
microsoft entra id (formerly azure active directory) can be used as an identity provider for both grafana and factry historian this allows you to centralize authentication and make use of existing user management, groups, and security policies central management of users and access in entra id extra security with features like multi factor authentication (mfa) users only need one set of credentials for multiple applications (e g grafana, historian, etc ) requirements to successfully setup microsoft entra id authentication, the following requirements must be met the application web page (grafana and/or historian) must be accessible over https the application must have access to the required https //learn microsoft com/en us/entra/identity/hybrid/connect/tshoot connect connectivity#connectivity issues in the installation wizard security groups must be created in azure, with the appropriate users assigned these azure security groups map one to one with the user groups defined in the application typically, the same security groups are created in azure as the user groups that already exist in factry historian or grafana setting up microsoft entra id the setup process consists of two parts docid\ y7nflubtgvhbfahpgvcbe create two separate application registrations in entra id, one for grafana and one for factry historian each app defines how its respective product connects to your directory configure authentication in each product after registering the app, follow the product specific instructions to connect it to entra id docid\ hrybcuqsezvwumwdjoew1 docid 8fvf2zgangaf70qy5yyec by completing these steps, both grafana and factry historian can share the same identity provider, reducing administrative overhead and improving security