Overview
Parameter: AZURECLIENTID
Category: Login
Default value: (empty)
Product: eTASK.Login
What does this parameter do?
AZURECLIENTID stores the unique application ID (client ID) that your portal needs to authenticate with Microsoft Azure Active Directory. This ID identifies your portal installation to Microsoft Azure and enables users to log in using their Microsoft 365 accounts.
What is this parameter used for?
The parameter is used when:
Users are to log in to the portal using their Microsoft 365 or Azure AD accounts
The Azure sign-in button on the login page needs to be enabled
Emails are to be sent via the Microsoft Graph API
Exchange Online calendars are used for room bookings
Users need to be imported from Azure Active Directory
Technical Details
Format: GUID (Globally Unique Identifier)
Default value: (leer)
Valid value:
A GUID in the format:
12345678-1234-1234-1234-123456789abcExample:
a1b2c3d4-e5f6-7890-abcd-ef1234567890
Important notes:
The client ID must be entered exactly as it appears in Azure
Together with AZURETENANTID, this parameter forms the basis for Azure authentication
The parameter works in conjunction with AZURELOGINACTIVE to control Azure login
The GUID is not case-sensitive
When should you change this value?
Set the value (enter the GUID) if:
You want to enable Azure Active Directory sign-in for your users
You want to use Microsoft 365 integration for email sending
You use Exchange Online calendars for room bookings
You want to automatically import users from Azure AD
Leave the value blank if:
You use only on-premises portal accounts or classic Active Directory
You do not need Microsoft 365 integration
The Azure infrastructure has not yet been set up in your organization
Important Notes
Azure app registration required
Before you can set this parameter, your IT department must create an app registration in Microsoft Azure. You can find the client ID there in the overview as "Application ID (Client)".AZURETENANTID also required
The client ID alone is not sufficient. You also need the tenant ID in the AZURETENANTID parameter.Configure permissions in Azure The
appropriate API permissions must be set in the Azure app registration, depending on the desired features (sign-in, email, calendar, etc.).Set the redirect
URL in Azure In Azure, your portal’s URL must be configured as an allowed redirect URL for sign-in to work.AZURELOGINACTIVE controls visibility
Even if AZURECLIENTID is set, the Azure sign-in button is only displayed if AZURELOGINACTIVE is set to 1.
Security
Does changing this parameter affect security?
Yes, configuring this parameter directly affects the security of user authentication.
Positive aspects:
Uses Microsoft’s highly secure OAuth 2.0 authentication
Centralized management of user accounts via Microsoft 365
Supports Microsoft's multi-factor authentication (MFA)
No need to store passwords in the portal
Note:
The client ID itself is not secret, but should only be known to authorized administrators
The associated client secret (if used) must be treated as strictly confidential
Incorrect Azure permissions can lead to security vulnerabilities or data protection issues
The redirect URLs in Azure must be strictly limited to your portal domain
Recommendation: Use Azure AD sign-in in combination with multi-factor authentication for maximum security. Ensure that only authorized IT administrators have access to the Azure App Registry and document all configured API permissions.
Practical example
Initial scenario: A company with 500 employees uses Microsoft 365 and wants users to be able to log in to the portal with their familiar Microsoft accounts instead of managing separate portal passwords.
Configuration: 1. IT administrator creates an app registration in the Azure Portal 2. Copies the "Application ID (Client)": a7f3e9d1-2b4c-6d8e-9f1a-3b5c7d9e1f2a 3. Copies the "Directory ID (Tenant)": b8e4f0e2-3c5d-7e9f-0a2b-4c6d8e0f3a4b 4. Sets AZURECLIENTID = a7f3e9d1-2b4c-6d8e-9f1a-3b5c7d9e1f2a 5. Set AZURETENANTID = b8e4f0e2-3c5d-7e9f-0a2b-4c6d8e0f3a4b 6. Set AZURELOGINACTIVE = 1
After the change:
A new "Sign in with Microsoft" button appears on the portal login page
Users click this button
They are redirected to Microsoft and sign in with their usual Microsoft 365 account
After successful sign-in, they are automatically redirected back to the portal and are logged in
Result: Employees can use their usual Microsoft 365 credentials and benefit from the multi-factor authentication that is already set up. The IT department no longer needs to manage separate portal passwords.
Recommended setting
For standard installations:(leer)(not configured)
Reason:
Azure integration requires additional configuration in Microsoft Azure
Not all customers use Microsoft 365 or Azure Active Directory
The default state enables classic login methods
Exceptions (Microsoft 365 environments):
Set the client ID from your Azure App Registration if you use Microsoft 365
Combine with AZURETENANTID and AZURELOGINACTIVE for full Azure integration
Highly recommended for companies with a comprehensive Microsoft 365 infrastructure
Tip: Test Azure login with a test user first before enabling it for all employees. Ensure that the redirect URLs in Azure exactly match your portal URL, including http/https and ports.