Microsoft Entra ID Setup¶
This guide walks through registering AgentCube as an application in Microsoft Entra ID (formerly Azure AD).
Step 1: Create App Registration¶
- Navigate to Azure Portal → Microsoft Entra ID → App registrations
- Click New registration
- Configure:
- Name:
AgentCube MCP(or your preferred name) - Supported account types: Accounts in this organizational directory only (Single tenant)
- Redirect URI: Select Web and enter:
- Name:
- Click Register
Multiple connectors
If you are deploying both Essbase and Planning connectors, add a redirect URI for each:
https://{essbase_connector_hostname}/auth/callbackhttps://{planning_connector_hostname}/auth/callback
You can add additional redirect URIs under Authentication → Platform configurations after registration.
Step 2: Create Client Secret¶
- Go to Certificates & secrets → Client secrets
- Click New client secret
- Set a description and expiration period
- Click Add
- Copy the secret VALUE immediately — it will not be shown again
Secret VALUE vs Secret ID
Entra shows two values: a Secret ID (a GUID) and the Secret VALUE (a long string). You need the VALUE, not the ID.
Step 3: Expose an API¶
- Go to Expose an API
- Click Set next to Application ID URI — accept the default
api://{client_id} - Click Add a scope:
- Scope name:
access - Who can consent: Admins and users
- Admin consent display name:
Access AgentCube - Admin consent description:
Allow the application to access AgentCube on behalf of the signed-in user
- Scope name:
- Click Add scope
Step 4: Set Token Version¶
- Go to Manifest
- Find
"requestedAccessTokenVersion"(it will benullby default) - Change
nullto2 - Click Save
Critical step
If you skip this step, Entra issues v1.0 tokens with an incorrect audience format, and authentication will fail.
Step 5: Record Configuration Values¶
You need three values for your AgentCube environment variables:
| Entra Value | Environment Variable |
|---|---|
| Application (client) ID | OIDC_CLIENT_ID |
| Client secret VALUE | OIDC_CLIENT_SECRET |
| Directory (tenant) ID | OIDC_TENANT_ID |
These values are found on the app registration Overview page (client ID, tenant ID) and in Certificates & secrets (secret value).
Next Steps¶
- Set up OCI Identity Domain for Oracle token exchange
- Generate the signing key
- Configure environment variables