Skip to main content
Skip table of contents

Onboarding your tenant in Routty

Access to Routty is securely managed through your organization’s Microsoft Entra ID (formerly Azure Active Directory). The onboarding flow uses Microsoft’s standard enterprise app model, consent, and OAuth 2.0/OpenID Connect for sign-in.

Prerequisites

  • Tenant ID (Directory ID) — the GUID of your Microsoft Entra tenant.

  • Group Object ID (optional) — the object ID of the security group that will control access to Routty.

    • Where to find it: Entra admin center → Entra ID → Groups → select your group → Object ID. How to manage groups

  • Admin role to complete onboarding — a Cloud Application Administrator (or Application/Privileged Role Admin) should open the consent link and manage assignments. Assign Microsoft Entra roles

License note (if using group assignment) — group-based assignment to apps requires Microsoft Entra ID P1/P2. Use a group to manage access to SaaS apps

Onboarding steps (5–10 minutes)

  1. Share your IDs with Routty
    Provide your Tenant ID and Group Object ID (see prerequisites).

  2. Open the secure admin consent link
    Your admin follows the consent URL we (or your implementation partner) provide. This performs tenant-wide admin consent and provisions Routty as an Enterprise application (service principal) in your tenant.

  3. Assign users or groups
    Enterprise apps → Routty → Users and groupsAdd user/group → select your security group (or individual users).

  4. Verify sign-in
    Users in the assigned group can now sign in to Routty using Microsoft Entra authentication (the Microsoft login page).


Technical details

Enterprise application (service principal)

When your admin grants consent, Microsoft creates a service principal for Routty in your tenant (visible under Enterprise applications). This is the identity object you assign users/groups to, and where you enforce “assignment required”. Apps & service principals in Microsoft Entra ID

Protocols & flows

Routty uses OAuth 2.0 and OpenID Connect (OIDC) via the Microsoft identity platform, with the Authorization Code flow. OAuth 2.0 and OpenID Connect protocols Microsoft identity platform and OAuth 2.0 authorization code flow

This authentication flow requests only the User.Read delegated permission scope from Microsoft Graph. This allows Routty to access the signed-in user’s basic profile: name, email, tenant information.


Security & privacy posture

  • Least-privilege: Routty requests only the minimal scopes/claims necessary (for example, basic user profile and group membership if you enable groups). Tokens come from Microsoft; Routty never sees your password. Tokens and claims overview

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.