You spin up a new service in Backstage, but before you can deploy, there’s a familiar roadblock: someone forgot to grant you access to the right repo or cluster. Ten messages later, you’re still waiting on a Slack approval. This is where integrating Backstage with Microsoft Entra ID (formerly Azure AD) earns its keep.
Backstage gives teams a central developer portal. Microsoft Entra ID provides identity and role-based access control. Combined, they turn your service catalog into a secure workspace where permissions follow users automatically. The result is repeatable automation that respects least-privilege rules without slowing engineers down.
Connecting Backstage and Microsoft Entra ID starts with the identity handshake. Backstage relies on an OpenID Connect (OIDC) provider to authenticate users. Entra ID plays that role perfectly since it already manages user identities across Microsoft 365, Azure, and most enterprise SaaS. Once Backstage trusts Entra as its OIDC provider, identity tokens carry user context through APIs, templates, and CI/CD pipelines. Every action in Backstage can then verify “who’s asking” without adding more login prompts.
The logic is simple but powerful. Entra handles authentication, Backstage enforces authorization, and together they map team membership to actions like “create component,” “update catalog entry,” or “deploy to dev.” If someone changes jobs or leaves the company, Entra ID revokes their access everywhere that token flows. Nothing manual, nothing forgotten.
Keep your configuration clean. Align Entra groups with Backstage entity ownership fields so role-based access control (RBAC) remains transparent. Rotate service principal secrets on a schedule that matches your enterprise policy. And always verify redirect URIs when testing locally. The setup should enhance trust, not depend on it.