Obfuscate AAD secrets


Please note This option is only available when WPO365 has detected the use of wp-config.php to configure one or multiple Identity Providers.

Refer to this tutorial for instructions how to utilize your site's wp-config.php file to configure a single Identity Provider to enable SSO / Sign in with Microsoft for your WordPress website (or this tutorial if you need to configure multiple Identity Providers).

Selecting this option prompts the plugin to replace the following Identity Provider configuration options in the database with placeholder data, presuming these settings have been configured via the wp-config file.

Name / key Type Example value
app_only_application_id (*) string The ID of the App registration in Entra ID that shall be used for OAuth based application-only scenarios, e.g. 00000000-0000-0000-0000-000000000000.
app_only_application_secret (*) string The secret string that the application uses to prove its identity when requesting a token, e.g. ~^yz…
application_id (*) string The ID of the App registration in Entra ID that shall be used for OpenID Connect based delegated scenarios such as SSO, e.g. 00000000-0000-0000-0000-000000000000.
application_secret (*) string The secret string that the application uses to prove its identity when requesting a token, e.g. ~^yz…
mail_application_id (*) string The ID of the App registration in Entra ID that shall be used to con.nect to Microsoft Graph to sent emails, e.g. 00000000-0000-0000-0000-000000000000.
mail_application_secret (*) string The secret string that the application uses to prove its identity when requesting a token, e.g. ~^yz…
mail_redirect_url (*) string The URIs we will accept as destinations when returning codes and tokens e.g. https://www.your-website.com/.
mail_tenant_id (*) string The unique identifier for your Microsoft 365 organization in Microsoft Admin Center e.g. 00000000-0000-0000-0000-000000000000.
redirect_url (*) string The URIs we will accept as destinations when returning codes and tokens e.g. https://www.your-website.com/
saml_base_url string e.g. https://www.your-website.com/
saml_idp_entity_id string Microsoft Entra Identifier e.g. https://sts.windows.net/xxx…
saml_idp_meta_data_url string App Federation Metadata Url e.g. https://login.microsoftonline.com/xxx…
saml_idp_sls_url string Microsoft Entra Login URL e.g. https://login.microsoftonline.com/xxx…/saml2
saml_idp_ssos_url string Microsoft Entra Login URL e.g. https://login.microsoftonline.com/xxx…/saml2
saml_sp_acs_url string Reply URL (Assertion Consumer Service URL) e.g. https://www.your-website.com/
saml_sp_entity_id string Identifier (Entity ID) e.g. https://www.your-website.com/6553391aed638
saml_sp_sls_url string Logout Url (Optional) e.g. https://www.your-website.com/wp-login.php?action=loggedout
saml_x509_cert (*) string Certificate (Base64) e.g. —–BEGIN xxx …
tenant_id (*) string The unique identifier for your Microsoft 365 organization in Microsoft Admin Center e.g. 00000000-0000-0000-0000-000000000000.
wp_rest_aad_application_id_uri (*) string Application ID URI e.g. https://www.your-website.com/00000000-xxx…

Please note that all keys marked with (*) were affected by this option before WPO365 version 30. All other keys have been added since.


Please note When an option is obfuscated, the following actions are applied to it:

1. Replaced with a placeholder value
2. Disabled the input element on the WPO365 configuration pages so it cannot be updated manually

Unchecking this option will not restore these options to their original values!

The following screenshot depicts an example of obfuscated Identity Provider's configuration options.

The table below summarizes options that are only mandatory to add to your site's wp-config.php when you configure multiple Identity Providers. These options are optional when you configure a Single Identity Provider using wp-config.php.

Name / key Type Example value
b2c_custom_domain string A custom domain name used for (B2C or Entra Ext. ID) authentication and authorization that allows the user to stay on your domain e.g. login.wpo365.com.
b2c_domain_name string The default sub domain name for (B2C or Entra Ext. ID) authentication and authorization e.g. wpo365connect (B2C domain becomes wpo365connect.b2clogin.com).
b2c_policy_name string The B2C policy name that WPO365 shall use when a user signs in with Azure AD B2C e.g. B2C_Signin_1.
b2c_signup_policy string The B2C policy name that WPO365 shall use when a user signs up with Azure AD B2C e.g. B2C_Signup_1 (leave empty if not enabled).
oidc_flow string If you choose “code” the authorization code will be separated from the ID token, while the “hybrid” flow directly issues an ID token after user authentication. The latter is considered less secure and should not be used, unless you configure support for Entra multi-tenancy.
oidc_response_mode string Choose “form_post” to have the IdP auto-submit a form-post to send the code / tokens to the client (mandatory if oidc_flow equals hybrid) or “query” to receive the tokens via the query string,
redirect_on_login_secret (*) string A secret key that – if added to the absolute URL of the login page – will bypass forced SSO (if activated) e.g. 37dk…
b2c_allow_multiple_policies bool Must be enabled if you want WPO365 to create URLs pointing to various user policy endpoints.
b2c_enable_signup bool If enabled, WPO365 will replace the default WordPress sign-up link with a URL pointing to the B2C signup policy’s endpoint.
redirect_url_strict  bool Whether or not to enable “strict mode” for the Redirect /ACS URL.
use_app_only_token bool Whether or not WPO365 should attempt to request a token for application-only scenarios.

Please note that all keys marked with (*) were affected by this option before WPO365 version 30. All other keys have been added since.

Default value Unchecked.

Versions ALL PREMIUM

Visit the website https://www.wpo365.com/

Did this answer your question? Thanks for the feedback There was a problem submitting your feedback. Please try again later.

Still need help? Contact Us Contact Us