Entra ID OAuth 2.0 & Thinfinity Workspace: Secure VDI SSO Guide

The Ultimate Guide to Secure VDI SSO
Picture of Finn Vega
Finn Vega

Solution Engineer

Table of contents

In the modern remote work landscape, identity is the new perimeter. Integrating Microsoft Entra ID (formerly Azure Active Directory) with Thinfinity Workspace represents a strategic convergence of cloud-native identity management and high-performance Virtual Desktop Infrastructure (VDI).

This integration moves organizations beyond vulnerable, static passwords. By leveraging OAuth 2.0 and OpenID Connect (OIDC), you can enable seamless Single Sign-On (SSO) for your VDI environment while enforcing enterprise-grade security policies like Multi-Factor Authentication (MFA), Conditional Access, and Zero Trust verification.

In this guide, we explore how combining Entra ID’s robust authentication engine with Thinfinity’s flexible user mapping creates a secure, compliant, and frictionless remote access solution.

Why Modernize VDI Authentication?

Infographic of VDI authentication steps: Redirect to Entra ID, MFA/device validation, and secure token issuance.

Traditional VDI often relies on users typing their domain credentials directly into a web portal or client login box. This approach carries significant risks:

  • Credential Exposure: Passwords can be intercepted by keyloggers or stolen via phishing sites mimicking the VDI portal.
  • Static Trust: Once a user logs in, they are trusted for the duration of the session, regardless of changes in risk signals.
  • Lack of Context: Basic LDAP authentication doesn’t account for device health, geolocation, or impossible travel scenarios.

The Solution: Offloading authentication to Microsoft Entra ID. Instead of Thinfinity handling the password, it redirects the user to Microsoft. Entra ID validates the user (checking MFA, device compliance, and risk score) and returns a secure token. Thinfinity trusts the token, not the password.

How It Works: The OAuth 2.0 Authorization Code Flow

Understanding the flow is key to appreciating the security benefits. Thinfinity utilizes the standard OAuth 2.0 Authorization Code Flow, ensuring user credentials never pass through the Thinfinity server.

12-step OAuth 2.0 sequence diagram showing secure authentication between a User, Thinfinity, and Microsoft Entra ID.

  1. User Request: The user navigates to their Thinfinity Workspace URL.
  2. Redirect: Thinfinity sees the user is unauthenticated and redirects their browser to the Entra ID Authorization Endpoint.
  3. Authentication: The user logs in at login.microsoftonline.com. This is where Conditional Access policies are applied (e.g., “Must be on a compliant laptop” or “Must perform MFA”).
  4. Code Issue: If successful, Entra ID sends a short-lived Authorization Code back to the user’s browser, which passes it to Thinfinity.
  5. Token Exchange: Thinfinity’s backend server takes this code and its own Client Secret and exchanges them directly with Entra ID for an Access Token (JWT). This back-channel communication prevents token interception.
  6. Access Granted: Thinfinity validates the token’s digital signature and grants the user access to their desktop.

Bridging Cloud Identity with On-Premises Resources

A common challenge in VDI is the “Identity Gap.” Your Identity Provider (Entra ID) is in the cloud, but your resources (Windows VMs, File Shares) are on-premises and expect Active Directory (AD) Kerberos tickets.

Thinfinity solves this via intelligent Identity Mapping.

The Mapping Logic

When Thinfinity receives the verified token from Entra ID, it extracts the user’s unique identifier (usually the email or UPN).

  • Entra ID User: [email protected]
  • Thinfinity Logic: Looks up the mapping rule.
  • Local AD User: CORP\john.d

Thinfinity then impersonates the mapped local AD user to launch the session. This means the user logs in with their cloud identity (and MFA), but the Windows OS sees a standard domain user. This ensures that NTFS file permissions, Group Policies, and application access rights function exactly as expected.

Strategic Benefits for the Enterprise

Key benefits of Entra ID SSO: Zero Trust verification, passwordless login with FIDO2, and centralized Azure policy.

Implementing Entra ID SSO for Thinfinity isn’t just a technical upgrade; it’s a security transformation.

1. Zero Trust Alignment

Zero Trust dictates “Never Trust, Always Verify.” With this integration, you aren’t just verifying the user once. Entra ID’s tokens are short-lived. When they expire, the user must re-authenticate (often silently). If a user’s risk profile changes—for example, if their laptop is detected with malware—Entra ID can block the next token refresh, instantly revoking VDI access.

2. Passwordless Readiness

Thinfinity is agnostic to how the user authenticates, only that they authenticated. This means you can adopt Passwordless methods in Entra ID—like FIDO2 keys, Windows Hello for Business, or the Microsoft Authenticator app—and Thinfinity instantly supports them without any configuration changes.

3. Centralized Policy Enforcement

Admins no longer need to configure MFA settings inside the VDI platform. You define your policies once in the Azure Portal (e.g., “Require MFA for all external access”), and they automatically apply to Thinfinity and every other enterprise app.

Implementation: How to Configure

Deploying this integration is straightforward but requires precise configuration of the “handshake” between your Thinfinity server and your Azure tenant.

Key Configuration Steps:

  1. App Registration: Create a new App Registration in the Entra ID portal to represent Thinfinity.
  2. Redirect URIs: define the callback URL (e.g., https://vdi.company.com/azure) to ensure Entra ID sends tokens to the right place.
  3. Client Secret: Generate a secret key that Thinfinity will use to prove its identity to Microsoft.
  4. API Permissions: Grant the app permission to read the user’s basic profile (User.Read) to extract the email address for mapping.
  5. Thinfinity Setup: Input the Tenant ID, Client ID, and Secret into the Thinfinity Server Manager.

Ready to set this up? For a step-by-step technical walkthrough with screenshots and specific parameter settings, please refer to our official Knowledge Base article: 👉 How to Configure Single Sign-On in Thinfinity Workspace Using Azure AD / Entra ID with OAuth.

Conclusion

The integration of Microsoft Entra ID and Thinfinity Workspace delivers the best of both worlds: the robust, adaptive security of the world’s leading identity platform and the high-performance, browser-based accessibility of modern VDI.

By decoupling authentication from infrastructure, organizations can enforce strict security standards—including MFA and Conditional Access—without compromising the user experience. Whether your workforce is connecting from a corporate branch or a coffee shop, this architecture ensures that every access request is verified, secure, and compliant.

Frequently Asked Questions (FAQ)

Does Thinfinity ever see or store the user's Azure AD password?

No. This is the primary security advantage of OAuth 2.0. The user enters their credentials directly into the Microsoft login page. Thinfinity only receives an access token (a digital “ticket”) proving the user is authenticated. This eliminates the risk of password theft via the VDI portal.

For basic Single Sign-On (SSO), the free version of Entra ID is usually sufficient. However, if you want to enforce Conditional Access policies (e.g., geoblocking, requiring compliant devices, or risk-based access), you will need Entra ID Premium P1 licenses.

Through Identity Mapping. When Entra ID sends the token, Thinfinity reads the user’s email or UPN (e.g., [email protected]). It matches this against your configured rules to find the corresponding Active Directory user (e.g., CORP\jane.doe). The session effectively runs as the local AD user, ensuring file shares and permissions work correctly.

Yes. You can invite external users to your Entra ID tenant as Guests. As long as you have a mapping rule in Thinfinity that links that guest’s unique ID to a specific internal AD account or a generic “Contractor” account, they can access the environment using their own corporate credentials.

You configure MFA entirely within the Microsoft Entra Admin Center. You do not need to change any settings in Thinfinity. If Entra ID challenges the user for MFA and they fail, Thinfinity simply never receives the token, and access is denied.

Since Thinfinity maps the session to the local AD user, local permissions (like NTFS access) apply immediately. However, if you disable the user in Entra ID to block remote access, the block takes effect the next time the OAuth token expires and attempts to refresh (typically within 1 hour), or immediately if Continuous Access Evaluation (CAE) is supported and active.

Thinfinity_logo
Design Your Entra ID–Powered VDI Architecture
Speak with our experts about integrating Entra ID with Thinfinity Workspace to enable secure SSO, MFA, and identity mapping from cloud users to on-premises AD. We’ll help you build a Zero Trust remote access strategy tailored to your environment.

Add Comment

Thinfinity-blue-logo
See Entra ID SSO with Thinfinity Live
Watch a live demo of Thinfinity Workspace integrated with Microsoft Entra ID. See how OAuth 2.0, OIDC, and Conditional Access deliver secure, seamless VDI Single Sign-On without exposing passwords to the VDI gateway.

Blogs you might be interested in

<span>Azure Entra ID</span>, <span>Multi-Factor Authentication</span>, <span>OpenID Connect</span>, <span>Single Sign-On (SSO)</span>, <span>Thinfinity Workspace</span>, <span>Virtual Desktop Infrastructure (VDI)</span>, <span>Zero Trust Security</span>