Entra URL Builder Logo

Microsoft Entra Sign-in URL Builder

Generate OAuth 2.0 authorization URLs for Microsoft Entra ID

Microsoft Sign-in

Microsoft Entra Sign In URL

Fill in the required fields below to generate your sign-in URL

Authorization URL
User sign-in flow for accessing resources - Learn more
Generate URLs for user authentication and authorization to access resources on their behalf
Admin Consent URL
Tenant-wide permission grants for applications - Learn more
Generate URLs for administrators to grant tenant-wide permissions to applications

Base Configuration

Common

Any organization

Specific Tenant

Single organization

Consumers

Personal accounts

Organizations

Work/school accounts

Choose the authentication endpoint: specific tenant for single organization, common for multi-tenant apps, consumers for personal Microsoft accounts only, or organizations for work/school accounts from any organization

Your Entra ID tenant identifier - can be the tenant GUID, domain name (contoso.onmicrosoft.com), or verified custom domain (contoso.com)

Essential Parameters

Unique identifier for your application, found in Entra portal under App registrations → Your app → Overview. Also called Application (client) ID

Where users are sent after authentication. Must exactly match a URI configured in your app registration's Authentication settings.

OIDC Scopes
Graph Permission Scopes

Use the quick toggles above for common OIDC scopes, or enter custom scopes in the text area. Scopes are space-separated permissions your app requests.

Single Response Types

Hybrid Response Types

Authorization Code Flow - Most secure option. Returns an authorization code that must be exchanged for tokens.

Recommended for: Web applications, mobile apps, and SPAs with PKCE.

Optional state parameter that will be returned after admin consent is granted

Optional Parameters

Random value to prevent CSRF attacks. Azure AD returns this exact value in the response, allowing your app to verify the request authenticity

Random value included in ID tokens to prevent replay attacks. Must be unique for each authentication request to ensure token freshness

Select a response mode to see details about how the authorization response will be returned.

Each mode has different security implications and use cases.

Default behavior - allows single sign-on when possible.

The user will not be forced to re-authenticate unless necessary.

Pre-populate the username field on the sign-in page. Useful when you know the user's email or username in advance

Skip the home realm discovery page and send user directly to their federated identity provider (e.g., ADFS) for the specified domain

National Cloud

Microsoft Global Cloud - login.microsoftonline.com

Default public cloud environment for most applications worldwide.