Connect OnPremiseAgent to Microsoft Entra ID (formerly Azure AD) for enterprise-grade single sign-on, role-based access control, and automated user provisioning. Synchronize groups, enforce conditional access policies, and maintain a unified identity layer across your AI agent infrastructure — all while keeping authentication data within your network boundary.
SAML, OIDC, OAuth 2.0
Identity & Access
Docker, Kubernetes, Bare Metal
Available
Everything you need to integrate Microsoft Entra ID into your on-premise agent workflows.
Enable SSO for all users via SAML 2.0 or OIDC, eliminating password fatigue and reducing credential exposure.
Automatically map Entra ID security groups to OnPremiseAgent roles and permissions for frictionless RBAC.
Enforce device compliance, location-based restrictions, and MFA requirements before granting agent access.
Automatically create, update, and deactivate user accounts when changes occur in your directory.
Route all authentication events to your Entra ID audit logs for centralized compliance reporting.
Connect multiple Entra ID tenants to a single OnPremiseAgent deployment for complex enterprise structures.
Create an enterprise application registration in your Entra ID tenant and configure redirect URIs.
Deploy SSO for 10,000+ employees across departments, ensuring every user accesses AI agents with their corporate credentials.
Meet SOC 2 and ISO 27001 access control requirements with centralized identity management and audit logging.
New hires automatically get AI agent access based on their department and security group membership.
Basic SSO works with any Entra ID tier. Advanced features like Conditional Access and SCIM provisioning require Entra ID P1 or P2.
Yes. You can configure both protocols simultaneously — SAML for legacy applications and OIDC for modern workloads.
No. All authentication is handled between your Entra ID tenant and your on-premise OnPremiseAgent deployment. No user credentials are stored or transmitted to our servers.
OnPremiseAgent reads group claims from the SAML assertion or OIDC token at login time. With SCIM enabled, group membership is also synchronized on a configurable schedule.
Combine Microsoft Entra ID with these connectors for a complete integration stack.
Deploy on your own infrastructure with full data sovereignty. Get started in minutes.