Azure AD

ID: azure-ad

Important: This plug-in is maintained by the Jenkins community and won’t be supported by Microsoft as of February 29, 2024.

A Jenkins Plugin that supports authentication & authorization via Azure Active Directory.

Setup In Azure Active Directory

  1. Open Azure Active Directory, click App registrations

  2. Click New registration

  3. Add a new Reply URL https://{your_jenkins_host}/securityRealm/finishLogin. Make sure "Jenkins URL" (Manage Jenkins => Configure System) is set to the same value as https://{your_jenkins_host}.

  4. Click Certificates & secrets, under Client secrets click New client secret to generate a new key, copy the value, it will be used as Client Secret in Jenkins.

  5. Click Authentication, under 'Implicit grant', enable ID tokens.

  6. (optional) To enable AzureAD group support: Click Manifest and modify the "groupMembershipClaims": "None" value to "groupMembershipClaims": "SecurityGroup", then 'Save' it.

In order for Jenkins to be able to lookup data from Azure AD it needs some Graph API permissions.

This is used for:

  • Autocompleting users and groups on the 'Configure Global Security' page
  • Jenkins looking up the user, e.g. when you use the Rest API
  • Group display name support (rather than just object ID)

Note: You can skip this part and just use the claims returned when authenticating.

  1. Click API permissions

  2. Add a permission

  3. Microsoft Graph

  4. Application permissions

  5. Add 'User.Read.All', 'Group.Read.All' and 'People.Read'

  6. Click Grant admin consent. If you are not an admin in your tenant, please contact an admin to grant the permissions.

Setup In Jenkins

Click Manage Jenkins in the left menu, then click Configure Global Security


  1. Check Azure Active Directory and fill in the credential.

  2. Click Verify Application to make sure your input is valid.

  3. Save the configuration, (logged-in users will have permission to do anything)

  4. Log in with Azure AD

  5. Return to 'Configure Global Security' to configure authorization

Note: if you haven't setup Graph API permissions, verify application will fail, skip over this step


Jenkins will match permissions based on the Object ID of a user or group.

This plugin extends the traditional Matrix Authorization Strategy with the ability to search by users / groups by display name when configuring the authorization rules. It will also include the display name in the authorization rule.

To use this feature:

  1. click Azure Active Directory Matrix-based security
  2. search for user in 'Azure User/group to add' and click Add
  3. select the permission(s) in the table
  4. click 'Apply'

You can still use other authorization strategies such as:

Just keep in mind that the Jenkins ID format will be used and not the DisplayName (Object ID) format of this plugin.

The following can normally be used:

  • Object ID of group
  • Display name of group (Only if Graph API permissions granted)
  • preferred_username claim which is normally the 'User principal name', but not always.
  • User principal name (Rest API authentication only)


Q: How to recover if Jenkins keeps failing during the login phase?

A: You can disable the security from the config file (see

Q: Why am I getting an error "insufficient privileges to complete the operation" even after having granted the permission?

A: It can take a long time for the privileges to take effect, which could be 10-20 minutes. Just wait for a while and try again.