Office 365 Single Sign-On (E20)

Follow these steps to configure Mattermost to use your Office 365 logon credentials and Azure Active Directory account as a Single Sign-on (SSO) service for team creation, account creation, and sign-in.

The system must be using SSL for use with Office365 as Microsoft only allows OAuth redirect URIs that are SSL enabled.

  1. Log in to your Azure Portal with the account that relates to the Azure AD tenant you want to register the application in. You can check the tenant in the top right corner of the portal.
  2. In the left-hand navigation pane, select the Azure Active Directory service, and then select App registrations > New registration.


  1. Give your new registration a Name, and then define which Supported account types can access the application. For example, if this is to be only accessed from your enterprise’s Azure AD accounts, then select Accounts in this organizational directory only. The Redirect URI should be defined as Web client. Also input the URL with the host name that will be specific to your Mattermost service followed by /signup/office365/complete. An example below is:


Now the App Registration has been created and you can configure it further. The standard Azure AD documentation is here for reference.

  1. Select Certificates and Secrets from the menu, and click the button to generate a New Client secret. Provide a description and define the expiry for the token.


Click Add and you will be provided with the client secret value, copy this and save it for use in the Mattermost configuration as the Application Secret Password.

  1. Select Overview from the menu and copy the Application (client) ID and the Directory (tenant) ID, for use in the Mattermost configuration as the Application ID and as part of the Auth Endpoint and Token Endpoint URL.


  2. Log in to Mattermost and then go to the System Console > OAuth 2.0 > Select OAuth 2.0 service provider, choose Office 365 as the service provider. Enter the client secret value you copied in Step 4 as the Application Secret Password. Paste the Application (client) ID you saved in Step 5 into the Application ID field.

  3. Open the config.json file and copy the Directory (tenant) ID value from Step 5. In the Office365Settings section of config.json you will be updating the default values from:

  • AuthEndpoint:
  • TokenEndpoint:

to include Directory (tenant) ID value, for example:

  • AuthEndpoint:
  • TokenEndpoint:
  1. Restart your Mattermost server to see the changes take effect.

Note about Microsoft Active Directory Tenants

A Microsoft Active Directory (AD) tenant is a dedicated instance of Azure Active Directory (Azure AD) that you own and would have received when signing up for a Microsoft cloud service such as Azure or Office 365. Tenants are commonly used by organizations who want to store information about their users such as passwords, user profile data and permissions. You can learn more about getting an Azure AD tenant here.

To allow your Azure AD users to sign in to Mattermost using Office 365 SSO, you must register Mattermost in the Microsoft Azure AD tenant that contains the users’ information. The registration can be done from the Microsoft Azure portal. The steps to register the Mattermost account in the tenant should be similar to those provided above, and you can find more information about integrating apps with Azure AD here.

If you don’t register Mattermost in the Microsoft Azure AD tenant your organization uses, Office 365 SSO will likely fail for your users.

If you’re interested in configuring a multi-tenant Mattermost application, which allows access to users from several organizations, you can find out more here.

Note that if you do not use Azure Active Directory, you may simply register Mattermost with your Office 365 or Azure account (either your personal, work or school account) and set up Office 365 SSO with Mattermost using the steps provided above.