Azure AD
Integrate Valohai with Azure Active Directory to centralize authentication and avoid duplicating access control settings. Users log in with their existing Azure AD credentials, and team membership updates automatically based on AD groups.
Prerequisites
An Azure account with permission to manage applications in Azure Active Directory. Any of these roles work:
Application Administrator
Application Developer
Cloud Application Administrator
Setup Overview
Verify your Azure AD domain with Valohai
Create an Azure AD App Registration
Configure access grants in Valohai
Users log in via Azure AD
Step 1: Verify Your Domain
Contact [email protected] with your Azure AD domain name (e.g., yourcompany.com or yourcompany.onmicrosoft.com).
Valohai will verify the domain and enable Azure AD integration for your organization.
Step 2: Create App Registration
Access Azure Active Directory
Sign in to Azure Portal
Search for "Azure Active Directory" in the top search bar
Select Azure Active Directory from results

Create New Registration
Under Manage, select App registrations
Click New registration

Configure Registration Details
Name: Enter a display name (e.g., "Valohai ML Platform"). This appears to users during login.
Supported account types: Select Accounts in this organizational directory only in most cases. See Microsoft's documentation for other scenarios.
Redirect URI:
Type: Web
URL:
https://app.valohai.com/accounts/azure/callback/
Click Register to create the app.

Note Your Application Details
After creation, note these values (you'll need them for Valohai configuration):
Application (client) ID: Found on the app overview page
Directory (tenant) ID: Found on the app overview page
Share these with [email protected] to complete the integration.
Step 3: Configure Access Grants
Access grants control which Azure AD users and groups can access your Valohai organization. Users must match at least one grant to log in.
Requirements
You must be a Valohai organization administrator.
Add Access Grants
Click Hi, <name> in Valohai
Select Manage <organization>
Go to Settings
Click Manage access grants in the Access Grants section
Click Add new grant
Configure the grant:
Grant IDs: Azure AD user or group UUIDs (see below)
Teams: Valohai teams to automatically assign matching users
Click Save
Find Azure AD UUIDs
User UUID
In Azure Portal, go to Azure Active Directory → Users
Find the user
Copy the Object ID (this is the UUID)
Group UUID
In Azure Portal, go to Azure Active Directory → Groups
Find the group
Copy the Object ID (this is the UUID)
Example Access Grants
Grant all data scientists access and auto-assign to team:
Grant IDs: <data-science-group-uuid>
Teams: data-scienceGrant specific executive access:
Grant IDs: <cto-user-uuid>, <vp-eng-user-uuid>
Teams: leadership, ml-engineeringMultiple groups with different team assignments:
Grant 1:
IDs: <ml-research-group-uuid>
Teams: research
Grant 2:
IDs: <ml-production-group-uuid>
Teams: production, opsStep 4: User Login
After setup completes:
Users navigate to app.valohai.com
Click Login with Azure AD
Authenticate using Azure AD credentials
Users are automatically added to your Valohai organization
Tell users to use the Azure AD login button, not the standard email/password login. This ensures they use SSO instead of creating separate Valohai accounts.
Automatic Team Mapping
Access grants automatically assign users to teams based on their Azure AD group membership:
Azure AD setup:
Group: "Data Scientists" (uuid: abc-123...)
Members: Alice, Bob, CharlieValohai access grant:
Grant IDs: abc-123...
Teams: data-science, ml-researchResult: When Alice logs in via Azure AD, she's automatically added to both the "data-science" and "ml-research" teams in Valohai.
Team changes: If you remove Alice from the Azure AD group and she logs in again, Valohai updates her team membership on the next login.
Advanced: Attribute Mapping
You can send additional user attributes from Azure AD to Valohai for more sophisticated team mapping.
Example attributes:
Department (Engineering, Research, Operations)
Job title (Data Scientist, ML Engineer)
Cost center codes
Custom attributes
Contact [email protected] to configure attribute-based team mapping for your organization.
Troubleshooting
User Can't Log In
Cause: User or their group isn't in any access grant.
Fix:
Find their user or group UUID in Azure AD
Add it to an access grant in Valohai
User tries logging in again
User Logs In But Has No Team Access
Cause: Access grant doesn't specify teams, or specified teams don't exist.
Fix:
Edit the access grant
Add appropriate teams
User logs out and logs in again to refresh team membership
Redirect URI Mismatch Error
Cause: Redirect URI in Azure AD doesn't match Valohai's callback URL.
Fix:
Go to Azure AD App Registration
Select Authentication
Verify redirect URI is exactly:
https://app.valohai.com/accounts/azure/callback/Save changes
User Accidentally Created Separate Account
Cause: User used email/password login instead of Azure AD button.
Fix:
User logs in via Azure AD (creates correctly-linked account)
Contact [email protected] to merge accounts
Security Best Practices
Use groups, not individual users: Manage access by adding/removing users from Azure AD groups rather than updating Valohai grants.
Review access grants quarterly: Audit which groups have access and their team assignments.
Require MFA in Azure AD: Enforce multi-factor authentication at the Azure AD level for all users.
Limit admin grants: Only grant Valohai admin privileges to users who need full organizational control.
Related Topics
Okta SAML SSO — Alternative SSO provider
Create Teams — Set up teams for automatic assignment
Invite Users — Manual user management (alternative to SSO)
FAQ — SSO-related questions
Last updated
Was this helpful?
