Azure Active Directory
Let your users authenticate into FeatureOS seamlessly with Azure Active Directory (Entra ID) integrations.
Managing access to your product feedback portal can get tricky, especially as teams scale. With the Azure Active Directory (Azure AD / Microsoft Entra ID) + FeatureOS integration, you can provide a seamless login experience while ensuring secure access to your boards.
This integration lets your users sign into FeatureOS with their existing Azure AD credentials, automatically adds them to private boards, and revokes access when employees leave your company. That means less manual work for admins, and more security and control for your organization. You can read our help article →
Note: The Azure AD integration is available on the Business Plan.
What You Can Do with Azure AD + FeatureOS
For organizations that use Microsoft's identity platform, this integration solves common access management pain points:
- Single Sign-On (SSO): Users see a "Continue with Microsoft" button on your FeatureOS portal. One click and they're in - no separate account or password required. You can enable or disable this alongside other authentication methods.
- Auto-provisioning to private boards: When a user signs in with Azure AD for the first time, they can be automatically added to specific private boards. This is useful for internal feedback boards where only employees should have access.
- Automated off-boarding: When someone leaves your organization and is removed from Azure AD, their FeatureOS access (Board, Admin, and Member roles) is automatically revoked. No manual cleanup, no lingering access.
- Centralized control: Your IT team manages everything from Azure AD. New hires get access through their Microsoft account. Departing employees lose access automatically. You maintain a single source of truth for identity.
Getting Started with Azure AD + FeatureOS
- In FeatureOS: Go to Dashboard → Organization Settings → Integrations.
- Click Connect under Azure Active Directory.
- Log in with your Azure AD Global Administrator account (ask your IT team if needed).
- Enable Consent on Behalf of Organization - this is mandatory for authenticated API calls to Azure.
- Once connected, configure your preferences:
- Select which private boards Azure AD users should be added to automatically.
- Set up off-boarding rules to revoke access when users are removed from Azure AD.
Your users will now see the option to Continue with Microsoft on your FeatureOS portal. You can also restrict login to Microsoft accounts only if you want to enforce SSO.
Permissions Requested
The integration requests two specific scopes from Azure AD:
Directory.Read.All- Allows FeatureOS to fetch details about users being added or removed in your Azure AD organization.offline-access- Allows FeatureOS to perform configured actions (like off-boarding) on behalf of the connected administrator.
Why This Helps
- Simplify access: One-click login for users with their Microsoft account. No separate credentials to manage.
- Manage private boards: Automatically assign authenticated users to specific boards without manual invitations.
- Automate off-boarding: When employees leave, their access is revoked automatically. No security gaps, no manual cleanup.
- Enterprise-grade security: Powered by Microsoft's identity infrastructure with full control over authentication methods.
- Reduce admin overhead: IT teams manage access through Azure AD, the same place they manage everything else. No extra dashboard to maintain.
Frequently Asked Questions
Common questions about the Azure Active Directory integration.
It connects FeatureOS with Azure Active Directory, allowing your users to log in with their Microsoft credentials and giving admins more control over access and off-boarding.
In FeatureOS, go to Dashboard → Organization Settings → Integrations → Azure AD → Connect, log in with a Global Administrator account, and enable “Consent on Behalf of Organization.”
Yes. You can choose which private boards Azure AD-authenticated users will be added to automatically.
If a user is removed from your Azure AD organization, their access to FeatureOS (Board, Admin, Member roles) is automatically revoked.
https://graph.microsoft.com/Directory.Read.All→ to fetch details about users added/removed in Azure AD.offline-access→ to perform configured actions on behalf of the connected user.
Yes. You can enable/disable authentication methods to restrict login to Microsoft accounts only.
Enterprise teams who want secure, centralized login management with automated user provisioning and off-boarding.
Can't find what you're looking for? Contact us at support@featureos.app