
Typically enabled if you selected a multi-tenant option for Supported account types for the application you just registered in Azure AD. (Optional) When enabled, your application will dynamically accept users from new directories. Enter the saved value of the Client secret for the app you just registered in Azure AD. String used to gain access to your registered Azure AD application. Enter the saved value of the Application (client) ID for the app you just registered in Azure AD. Unique identifier for your registered Azure AD application.

You can find this on your Azure AD directory's overview page in the Microsoft Azure portal. Logical identifier for your connection it must be unique for your tenant. Add Scopes/Permissions to Call Identity Provider APIs.Email Verification for Azure AD and ADFS.Connect Your Auth0 Application with Okta Enterprise Connection.Connect Your App to Microsoft Azure Active Directory.Connect Your App to SAML Identity Providers.


Connect to OpenID Connect Identity Provider.Connect Your Native App to Microsoft Azure Active Directory Using Resource Owner Flow.Connect Your App to Active Directory using LDAP.
