Entra ID Integration
OSDU uses its own entitlements system to control who can access services and data. At Equinor, we integrate this with Microsoft Entra ID so that access is managed centrally — you don't need to maintain user memberships in two places.
The goal: instead of managing users separately in both Entra ID and OSDU, Entra ID becomes the single source of truth. Access is granted, revoked, and audited in one place — changes flow through to OSDU automatically.
Currently available for dev and test only
Entra ID integration is live for the dev and test environments. Production does not yet support Entra ID integration — users need to apply for access through AccessIT and use the old per-instance scope. See the migration checklist for details.
How it works
Entra ID security groups can be added as members of OSDU entitlement groups. When a user calls an OSDU API, the entitlements service checks the user's Entra ID group memberships at runtime via Microsoft Graph. If the user belongs to an Entra ID group that is a member of the required OSDU group, access is granted.
This means:
- Users get access automatically when they are added to an Entra ID group — no separate OSDU onboarding step is needed (currently dev and test only)
- Access is revoked automatically when a user is removed from the Entra ID group
- Dynamic group membership in Entra ID (e.g. based on department or job title) flows through to OSDU
What this means for Equinor users
When you join Equinor, your account is added to Entra ID groups that map to OSDU platform groups. This is why you automatically receive read access to the dev and test environments without applying for anything. For production, you need to apply for read access through AccessIT — see the step-by-step guide.
The same model applies to data access. Data office groups in OSDU can have Entra ID groups as members, so when you are granted access to a data office group via AccessIT, the underlying mechanism is Entra ID group membership.
How access decisions are made
This check happens at runtime — there is no sync or replication of group data. Changes to Entra ID group membership take effect immediately.
Applications and client credentials
Entra ID group resolution only works for delegated (user) tokens. Applications using client credentials are not resolved through Entra ID groups and must be added directly as members of the required OSDU groups. The new unified scope (https://energy.azure.com/.default) works for client credentials as well — see the migration checklist for details.
Further reading
- ADME — Authentication and Authorisation — how tokens and entitlements work