The Azure AD authentication allows you to use an Azure Active Directory tenant as an identity provider for Grafana. You can use Azure AD Application Roles to assign users and groups to Grafana roles from the Azure Portal. This topic has the following sections:
- [Azure AD OAuth2 authentication](#configure-azure-ad-oauth2-authentication)
- [Configure Azure AD OAuth2 authentication](#configure-azure-ad-oauth2-authentication)
- [Create the Azure AD application](#create-the-azure-ad-application)
- [Assign server administrator privileges](#assign-server-administrator-privileges)
- [Enable Azure AD OAuth in Grafana](#enable-azure-ad-oauth-in-grafana)
- [Set up OAuth2 with Auth0](#set-up-oauth2-with-auth0)
- [Set up OAuth2 with Bitbucket](#set-up-oauth2-with-bitbucket)
- [Set up OAuth2 with Centrify](#set-up-oauth2-with-centrify)
- [Set up OAuth2 with OneLogin](#set-up-oauth2-with-onelogin)
- [Role mapping](#role-mapping)
- [Role Mapping](#role-mapping)
- [JMESPath examples](#jmespath-examples)
- [Map user organization role](#map-user-organization-role)
- [Map server administrator privileges](#map-server-administrator-privileges)
- [Team synchronization](#team-synchronization)
- [Skip organization role sync](#skip-organization-role-sync)
This callback URL must match the full HTTP address that you use in your browser to access Grafana, but with the suffixed path of `/login/generic_oauth`.
@ -106,7 +116,7 @@ You can set the user's display name with JMESPath using the `name_attribute_path