Powered by Zoomin Software. For more details please contactZoomin

Use Progress Data Cloud

Microsoft Entra ID app registration

  • Last Updated: May 12, 2026
  • 4 minute read
    • Progress Data Cloud
    • Documentation

Progress Data Cloud supports authentication with a native Microsoft Entra ID app integration. However, you may want to set up your own Entra ID app for the following reasons:

  • Use your organization's authentication app instead of Progress's native app integration
  • Map Entra ID roles to Progress Data Cloud roles

To enable this feature, your Microsoft Entra ID administrator must create an Entra ID app registration and provide the configuration details to the Progress Data Cloud Operations Team as described in the following procedure.

Create app registration

To create an app registration for Progress Data Cloud:

  1. Sign in to the Azure portal:

    • Standard Azure: https://portal.azure.com/
    • Azure US Government: https://portal.azure.us
  2. Navigate to Microsoft Entra ID by typing in the search box or selecting from the menu.

  3. In the Manage section, select App registrations.

  4. Select + New registration.

    Azure app registration new registration button

  5. Complete the Register an application form:

    • Name: Enter a descriptive name such as "Progress Data Cloud Authentication"

    • Supported account types: Select Accounts in this organizational directory only

    • Redirect URI: Select Web and enter <base tenant URL>/signin-microsoft

      For example: https://demotenant.data.progress.cloud/signin-microsoft for a tenant named "demotenant".

  6. Select Register.

    Azure app registration form

Configure token claims

After the app registration is created, configure the required token claims:

  1. In the app registration, go to Token configuration under Manage.

  2. Select + Add optional claim.

  3. In the Add optional claim dialog:

    • Token type: Select ID
    • Claims: Select email, family_name, and given_name
  4. Select Add.

    Azure token configuration dialog

Configure API permissions

Configure the required Microsoft Graph permissions:

  1. Go to API permissions under Manage.

  2. Verify that the following Microsoft Graph delegated permissions are present:

    • User.Read
    • email
    • profile
    • openid

    Azure API permissions section

  3. If any permissions are missing:

    1. Select + Add a permission.
    2. Select Microsoft Graph.
    3. Select Delegated permissions.
    4. Select the missing permissions from the list.
    5. Select Add permissions.

    Azure request API permissions dialog

  4. Select Grant admin consent for <your directory> and confirm Yes when prompted.

Enable app roles

If you want to use Microsoft Entra ID app roles for Progress Data Cloud role mapping:

  1. Go to Manifest under Manage.

  2. Change the groupMembershipClaims value from null to "ApplicationGroup" (include the quotes).

  3. Select Save.

    Azure app manifest configuration

Configure authentication

Enable ID token authentication:

  1. Under Manage, go to Authentication > Settings.

  2. Under Implicit grant and hybrid flows, select ID tokens (used for implicit and hybrid flows).

  3. Select Save.

    Azure authentication configuration

Collect configuration values

Gather the required configuration values for the Progress Data Cloud Operations Team:

  1. Go to Overview and copy the following values to a secure location:

    • Application (client) ID: This is the Client ID
    • Directory (tenant) ID: This is the Tenant ID

    Important:

    You will need to supply these values to the Progress Data Cloud Operations Team to configure authentication.

  2. Go to Certificates & secrets under Manage.

  3. In the Client secrets section, select + New client secret.

  4. In the Add a client secret dialog:

    • Description: Enter a description such as "OAuth2 Authentication"
    • Expires: Select an expiration duration (2 years is recommended for production)
  5. Select Add from the Add a client secret dialog. Then, immediately copy the value in the Value field to a secure location.

    Important:

    This is the client secret that you must supply to the Progress Data Cloud Operations Team. It will only be displayed once. If you navigate away from this screen, the secret cannot be retrieved again.

    Azure client secret value display

Configure app roles

If you want to use Microsoft Entra ID app roles for Progress Data Cloud role mapping, configure app roles as described in Microsoft Entra ID roles.

Provide configuration to Progress Data Cloud Operations Team

Provide the following values to the Progress Data Cloud Operations Team to configure your tenant authentication:

  • Tenant ID: Directory (tenant) ID from the app registration overview
  • Client ID: Application (client) ID from the app registration overview
  • Client Secret: The secret value you copied when creating the client secret

Important:

Keep these values secure and share them only through approved secure channels.

TitleResults for “How to create a CRG?”Also Available inAlert