Connect Microsoft Entra ID with Relution
Introduction
By connecting Microsoft Entra ID with Relution, you create the foundation for Microsoft-based integrations in your organization. This includes, for example, connecting Windows devices and using additional Microsoft services together with Relution.
In addition, users and groups from Microsoft Entra ID can be synchronized with Relution. This allows user accounts to be managed centrally in Microsoft and automatically provisioned in Relution.
In order for synchronized users to sign in to Relution afterwards, OIDC authentication must also be configured. If access is to be secured using Conditional Access, both the connection to Microsoft Entra ID and the configuration of OIDC are required.
The required settings are configured partly in Relution and partly in the Microsoft Entra admin center.
Requirements
The following requirements must be met in order to connect Microsoft Entra ID with Relution:
- an existing Microsoft
Entra IDor Azure environment - sufficient permissions in Microsoft Entra, usually the
Global Administratorrole - a reachable Relution server
- the Relution server URL, which will later be stored in Microsoft Entra
Open the connection settings in Relution
In the Relution portal, you can find the setup area under Settings > User management > Entra ID.
There, a guide supports you in configuring and connecting Microsoft Entra.

Add the MDM application
First, a new MDM application is created in Microsoft Entra and completed with the details from the Relution guide.
Add the domain of the corresponding Relution server in Microsoft Entra ID under Custom domain names. This may take some time. Further information can be found in the Microsoft documentation.
Microsoft documentation →
Under Mobility (MDM and MAM), the desired MDM application is then added and enabled:

- Select the
On-Premises MDM applicationtile in the lower right. - Assign a name.
- Click
Add.
The new MDM application is then configured with the details from the Relution guide: - Select the desired setting for
MDM user scope. - Enter the URL for the
MDM terms of usefrom Relution:
https://serverurl/api/device/v1/windows/termsOfUse
Microsoft queries this URL before each enrollment. No webpage is opened.
- Enter the
MDM discoveryURL.
https://serverurl
- Click
Save.
Configure the MDM application settings
After the new MDM application has been created, the local MDM application settings can be configured in Microsoft Entra. The following values from Microsoft Entra must be transferred to the Relution guide:
Application (client) IDDirectory (tenant) ID- Value of the
Client secret
Then click Application ID URIin the local MDM application settings to edit it.
In the following view, enter the corresponding server URL for the Application ID URI.
Next, add a Client secretunderCertificates & secrets: - Click
New client secretin theClient secretstab. - In the
Add a client secretdialog, enter a description and select the validity period. - Click
Add.
If the validity period expires, the connection is no longer available and Relution can no longer communicate with Microsoft Entra. In this case, a new
Client secretmust be created for the application in Microsoft Entra and transferred again to Relution.The new entry is then displayed in the list under the
Client secretstab. The correspondingValueis displayed only once and must be copied immediately and transferred to Relution.
Configure API permissions
In the next step, the API permissions are configured:

Additional permissions may need to be added later if further Microsoft functions are used in the future. The following settings must be configured in Microsoft Entra:
- Under
API permissions > Configured permissions, clickAdd a permission. - In the
Request API permissionsdialog, selectMicrosoft GraphunderMicrosoft APIs.
- In the next step, select the
Application permissionstile.
- Select
User.Read.AllforUser.
- Select
Group.Read.AllforGroup.
- Select
Device.ReadWrite.AllforDeviceand confirm the selection withAdd permissions.
For newly added API permissions, an exclamation mark is initially shown as the status. An administrator must grant consent once so that Microsoft Graph actually receives the permissions. Afterwards, the status is displayed with a green check mark as Granted, and the permissions are active.
Define the redirect URI
In the Relution guide, the Redirect URI is then configured in Microsoft Entra:

- Under
Authentication, clickAdd a platform. - In the
Configure platformsdialog, select theWebtile.
- In the next step, under
Web, enter the server URL inAdd a Redirect URI. - Disable the
ID tokenscheckbox. - Click
Save.
This completes the setup in Microsoft Entra.
Select the Relution service options and complete the setup
In the Relution guide, you can optionally choose whether Microsoft Entra ID users and Microsoft Entra ID groups should be synchronized with Relution:
Click Save to complete the setup and connection of Microsoft Entra ID in Relution.
Summary
After completing these steps, Microsoft Entra ID is connected with Relution. This allows users and groups from Microsoft Entra ID to be synchronized with Relution and enables the use of additional Microsoft-related functions.
In order for synchronized users to sign in to Relution, OIDC authentication must also be configured. This also applies to the use of Conditional Access.
The new entry is then displayed in the list under the