Add Microsoft OpenID Connect for your marketplace


This article provides step-by-step instructions on configuring Azure Active Directory (Azure AD) with your Gigantik marketplace. OIDC authentication allows collectors to securely authenticate and access your Gigantik Marketplace using their existing Microsoft accounts.


  • An active Microsoft Azure account with access to the Azure portal
  • Access to the Gigantik CMS

Accessing the Azure Portal

  1. Open your web browser and navigate to the Azure portal
  2. Sign in to the Azure portal using your Azure account credentials.
  3. Once logged in, navigate to Azure Active Directory using the sidebar menu.
Azure Active Directory in the Azure Portal

Azure Active Directory in Azure Portal

Registering an Application in Azure AD

  1. In the Azure Active Directory menu, click on App registrations.
  2. Click the New registration button to create a new application registration.
  3. Provide a name for your application and select the supported account types.
  4. For the Redirect URI, select Web and enter your marketplace URL with a trailing slash. For example, enter ""
  5. Click Register to create the application registration.
An Example Application

An Example Application in Azure


This process may change based on decisions at Microsoft. Please see the official documentation:

Configuring Authentication in Azure AD

  1. On the left navigation bar, click on Authentication under the Manage section.
  2. Under Implicit Grants and Hybrid Flows, check the box for ID tokens.
  3. Click Save to save the authentication configuration.
Authenication Configuration in Azure

Authenication Configuration in Azure

Configuring the OIDC Provider in the Gigantik CMS

  1. Log in to the Gigantik CMS
  2. Navigate to Marketplace > OpenID Connect
The OpenID Connect Integration in the CMS

The OpenID Connect Integration in the CMS

  1. At the top right of the Open ID Connect screen, click the Add OpenID Connect Provider button
    1. Provide a name for the OIDC provider (e.g. "Microsoft").
    2. In the Discovery Endpoint field, enter ""
    3. In the Client Id field, enter the client ID found under your App Registration in the Azure portal.
    4. Optionally, you may provide a button image for the OIDC Provider to enhance the user interface.
OpenID Setup in the CMS

OpenID Setup in the CMS

  1. Save the configuration settings.


By following the steps outlined in this article, you should now have successfully set up OIDC authentication for your Gigantik Marketplace using Microsoft as the identity provider. With this setup, collectors can now authenticate securely and access your Gigantik marketplace using their Microsoft credentials.

For further information about advanced configuration options, refer to the official Microsoft documentation.