Set Up Microsoft SSO on Login

Available Wednesday, January 28th, 2026.

About

Set up Microsoft Azure Entra as your Single Sign-On (SSO) identity provider to let users log in to RXNT with their Microsoft credentials. This integration simplifies account management and enhances security by centralizing authentication through your organization’s Microsoft Azure Entra domain. This article walks you through the steps to configure Microsoft Azure Entra as your SSO identity provider in RXNT, including how to generate the necessary credentials and complete the setup.

Configure Microsoft Azure Entra for SSO with RXNT

Create an application registration in Azure

Navigate to the Azure Portal and search for Microsoft Entra ID.

In the Microsoft Entra ID screen, click Manage in the left menu, then click App registrations.

In the App registrations screen, click + New Registration.

Register the new application with the following fields:

Enter RXNT as the Name.

For Supported account types, select Accounts in this organizational directory only.

In the Redirect URI (optional) field, select Web as platform and enter https://auth.rxnt.com/oauth2/callback in the URL field.

Click Register.

Configure branding (terms of use & privacy policy)

Once the application is created, you will be redirected to the Overview page, click on Manage, then Branding & properties.

In the Branding page, enter the following values, then click Save.

Configure and save Client ID, issuer URL and secret 

Disable public client flows

Click on Manage, then Authentication, then select the Settings tab.
 

Look for the Allow public client flows section, then make sure it is disabled.

Identify Client ID

Navigate back to the Overview page, then copy the Application (client) ID. Save this Client ID as it is needed in a later step.

Identify issuer URL

Click on Endpoints.

Copy and save the Authority URL, then close that tab. Save this URL as it will be used as the Issuer URL in a later step.

Create client secret

From the Overview page, click Add a certificate or secret.

Click New client secret.

Enter RXNT Client Secret into the Description field, then select an expiration date from the Expires dropdown menu.

After the OAuth client is created, the page will display your new client credentials. Make sure to copy and safely save the Client Secret (in the Value column), as you'll need to enter it into RXNT in the next step. Azure will not display the value to you again.

By this point you should have copied and securely stored the following: 

  • Client ID
  • Client Secret
  • Issuer URL

Configure SSO identity provider settings

You must have the practice administrator role to access this.

Now, log in to the RXNT Product Dashboard. In the top right corner, click on the Utilities menu, then click Settings.

Select SSO Identity Providers from the left side menu, then click Enable Single Sign-On (SSO) for this company.

Select Microsoft Entra (Azure AD) as the identity provider, and enter the Client ID, Client Secret and Issuer Url from the previous step.

Click Save.

All users within your practice will now be able to log in to RXNT using their Microsoft credentials. 

Disable external identity provider 

If you need to temporarily turn off SSO for your organization, you can disable the Microsoft Entra (Azure AD) connection without deleting it. Disabling SSO prevents users from signing in with Microsoft, but your configuration and credentials remain saved. You can re-enable it at any time.

On the Login Management screen, click Enable Single Sign-On (SSO) for this company to disable it.

Click Disable to confirm.

Once disabled, users must sign in using their RXNT credentials until SSO is re-enabled.

To re-enable, click Enable Single Sign-On (SSO) for this company.

Click Enable to confirm the action.

All users within your practice will now be able to log in to RXNT using their Microsoft credentials again.

Delete external identity provider

Deleting the Microsoft Entra (Azure AD) identity provider permanently removes your SSO configuration and stored credentials. The users in your organization will need to log in with RXNT credentials. This action cannot be undone. If you later want to use Microsoft Entra (Azure AD) for SSO again, you’ll need to re-enter your credentials and complete the setup process from the beginning.

On the Login Management screen, click Delete.

Type DELETE into the box, then click the Delete button.

Users will now need to log in with their RXNT credentials or another enabled identity provider.

Still, need help? Contact us!

Have a great idea? Tell us about it!

Was this article helpful?
0 out of 0 found this helpful