Set up single sign-on (SSO)

Modified on Wed, 01 May 2024 at 12:16 PM


Multi-factor authentication is required for Government-connected software. It enhances security by requiring a second form of verification alongside your password.  

If you have Microsoft accounts already secured with multi-factor authentication, your organisation can opt for single sign-on via Microsoft Azure B2C as an alternative to Authenticator App logins.

Step 1: Register an Application

  1. Within Microsoft Azure AD, go to App registrations and click New registration.

  2. Create the application by completing the registration application page. You can name the application as you wish. The redirect URL is:

Step 2: Add a Logout URL and select flow options

  1. Go to Manage Authenticationand add the following logout URL:
  2. Under Implicit and hybrid flows, click the tick boxes for: 
    • Access tokens (used for implicit flows); and 
    • ID tokens (used for implicit and hybrid flows)

Step 3: Add a Scope

  1. Go to Expose an API.
  2. Click Add a scope.

Step 4: Add optional claims

Under Token Configuration > click the check box next to the following to add optional claims:

  • email
  • family_name
  • given_name

Step 5: Open the Endpoints in Azure AD

  1. Go to Overview and then click on Endpoints and locate the OpenID Connect metadata document which will end in /.well-known/openid-configuration.
  2. Copy the client ID

Step 6: Contact TaxLab Support

Please contact to discuss options for you to securely provide us with the following information to complete the connection:

  1. OpenID Connect metadata document;
  2. client ID.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select atleast one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article