Using a Microsoft corporate account and the Sign in with Microsoft option can streamline the sign-in process.
To sign in to Dynatrace SaaS SSO using a Microsoft account
Select Sign in with Microsoft without entering a login in the login field.
On first usage, you are presented with a Permission requested message on the Microsoft portal, where you are asked to allow Dynatrace to process your name and email address before proceeding.
When you select Accept, you are redirected to the Microsoft sign-in screen, where you can easily authenticate with the credentials to your corporate Microsoft account.
Sign in with Microsoft triggers a login process using the OpenID Connect Protocol, but works in the same manner as when you enter your email address in the Dynatrace sign-in form. Signing in with Microsoft can also accelerate the authentication process with Azure: if your domain is configured to use SAML federation with Dynatrace, it will be used as part of the login flow.
How the sign-in process works depends on whether the user's email address domain is in global federation.
User's email address domain is in global federation?
Sign-in process
Yes
We switch to SAML flow, which uses JIT-provisioning to create your user and create the session.
No
Does the user exist in Dynatrace?
Some Azure IdP configurations prohibit users from allowing the Dynatrace OpenID Enterprise Application to give consent to profile information. For a solution, see these instructions for configuring consent and permissions in the Dynatrace Community.
Currently, only globally scoped federations are supported. The Sign in with Microsoft option won't work as expected for Account federated guests because they log in using account default federation, which has the account scope instead of the global one. However, we are actively working on enabling this feature for tenant and account federations.
You may be running into one of the limitations noted earlier.
When you use the "Sign in with Microsoft" flow, you're essentially initiating an OpenID Connect (OIDC) authentication process. This flow involves creating a trust relationship between your application and Microsoft Entra ID, which results in the automatic registration of an Enterprise Application in your tenant.
To complete the process, the value of preferred_username field from ID token is required. To receive the preferred_username field in the ID token, your app must request the following scopes during the authentication flow: