{"id":1763,"date":"2024-05-21T03:16:06","date_gmt":"2024-05-21T10:16:06","guid":{"rendered":"https:\/\/devblogs.microsoft.com\/identity\/?p=1763"},"modified":"2024-12-02T06:55:38","modified_gmt":"2024-12-02T14:55:38","slug":"custom-url-domains","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/identity\/custom-url-domains\/","title":{"rendered":"Adding branded URLs to authentication with Microsoft Entra External ID Custom URL Domains"},"content":{"rendered":"<p>We are excited to announce the Public Preview of <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/external-id\/customers\/concept-custom-url-domain#how-a-custom-url-domain-works\">Custom URL Domains<\/a> for Microsoft Entra External ID that enable you to replace default Microsoft authentication domain endpoints with your own brand names.  <\/p>\n<p>Custom URL domains are designed to provide flexibility and customization for the authentication journey. <\/p>\n<p>In this blog post, we explore custom URL domains and how to configure them. <\/p>\n<h1>What are custom URL domains?<\/h1>\n<p>Custom URL domains\u202fprovide you with a unique, personalized domain endpoint. You can add, verify, and use this domain for your application\u2019s sign-in experience. By replacing the default Microsoft authentication endpoint with your own chosen domain, you can reflect your brand or business identity. <\/p>\n<h1>Why use custom URL domains?<\/h1>\n<p>Custom URL domains enhance the user experience by unifying the login experience with your brand, fostering loyalty and trust. <\/p>\n<p>By avoiding third-party redirections, you ensure that users remain immersed in your brand environment, reducing confusion. A consistent experience ensures that users feel confident and secure, knowing their interactions occur within a familiar branded context. <\/p>\n<p>Consider, for example, Contoso Ltd., who have their main website at <code>https:\/\/www.contoso.com\/<\/code>. Instead of using their Microsoft authentication domain, <code>contoso.ciamlogin.com<\/code>, users can be directed to <code>login.contoso.com<\/code> for access and remain within a branded authentication environment. <\/p>\n<p>Staying on the same domain during sign-in will help mitigate the impact of third-party cookie blocking. <a href=\"https:\/\/devblogs.microsoft.com\/identity\/managed-devices-for-blocked-third-party-cookies\/\">Many browsers block\u202fthird-party cookies<\/a> (cross-domain cookies) on requests to domains other than the domain shown in the browser&#8217;s address bar. For more information, see <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity-platform\/reference-third-party-cookies-spas\">our documentation<\/a>. <\/p>\n<h1>How custom URLs work<\/h1>\n<p>You can configure custom URL domains in the Microsoft Entra Admin Center under: <strong>Settings<\/strong> &gt; <strong>Domain names<\/strong> &gt; <strong>Custom URL domains<\/strong>  <\/p>\n<ul>\n<li>Add your custom domain name<\/li>\n<li>Finish the verification process by adding the TXT details in your DNS<\/li>\n<li>Enable the verified domain to use it as a custom URL domain  <\/li>\n<\/ul>\n<p>With this release, you must configure Azure Front Door as a reverse proxy and add your custom URL domain in that instance.  <\/p>\n<p>The following diagram illustrates the Azure Front Door integration:<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/devblogs.microsoft.com\/identity\/wp-content\/uploads\/sites\/74\/2024\/05\/Azure-Front-Door-integration-diagram.png\" alt=\"Azure Front Door integration diagram\" \/><\/p>\n<blockquote>\n<p><strong>Note:<\/strong> After configuring\u202fcustom URL domains, your existing authentication at <code>&lt;tenant-name&gt;.ciamlogin.com<\/code> will continue to function. However, users will need to log in again when switching to custom URL domains as existing sessions will no longer be valid.<\/p>\n<\/blockquote>\n<p>For more information and detailed configuration guides, please check out <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/external-id\/customers\/concept-custom-url-domain\">our docs<\/a>.  <\/p>\n<h1>Participate in the Public Preview<\/h1>\n<p>We are actively looking for customers to participate in the Public Preview of this new feature. Explore the docs above to learn about how custom URL domains work and how to enable them for Microsoft Entra External ID. Your feedback is important for us. Please <a href=\"https:\/\/forms.microsoft.com\/r\/Mgzb2Z0TAN\">let us know what you think<\/a> about this new capability!<\/p>\n<h1>Let\u2019s stay connected<\/h1>\n<p>To learn more or test out features of the Microsoft Entra portfolio, visit our\u202f<a href=\"https:\/\/aka.ms\/dev\/ms-entra\">developer center<\/a>. Sign up for email updates on the\u202f<a href=\"https:\/\/aka.ms\/devblog\/ms-entra\">Identity blog<\/a>\u202fto keep up with all things Identity. And follow us on\u202f<a href=\"https:\/\/www.youtube.com\/@MicrosoftSecurity\/playlists\">YouTube<\/a>\u202ffor video overviews, tutorials, and deep dives. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Announcing the Public Preview of Custom URL Domains for Microsoft Entra External ID. Learn how to replace default Microsoft authentication domains with branded URLs, enhancing customization and user experience. Read on to explore setup steps and key benefits.<\/p>\n","protected":false},"author":158891,"featured_media":175,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[32,33],"tags":[38,16,47,50],"class_list":["post-1763","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-product-updates","tag-authentication","tag-entra","tag-external-id","tag-identity"],"acf":[],"blog_post_summary":"<p>Announcing the Public Preview of Custom URL Domains for Microsoft Entra External ID. Learn how to replace default Microsoft authentication domains with branded URLs, enhancing customization and user experience. Read on to explore setup steps and key benefits.<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/posts\/1763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/users\/158891"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/comments?post=1763"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/posts\/1763\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/media\/175"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/media?parent=1763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/categories?post=1763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/identity\/wp-json\/wp\/v2\/tags?post=1763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}