An Azure service used to deploy Grafana dashboards for analytics and monitoring solutions.
Hello Ashish K Padhy It sounds like you’ve got Azure Managed Grafana locked down behind a Private Endpoint and Application Gateway — you can hit the Grafana login page, but the SSO/OAuth flow is failing. In most cases that’s because even “private-only” Grafana still needs outbound access to public Microsoft Entra ID endpoints (like login.microsoftonline.com, graph.microsoft.com, etc.) to complete the OAuth handshake. When you disable public access and lock down your subnets, those calls get blocked.
Here’s what you can try:
- Allow outbound to the Microsoft Entra ID endpoints : • If you’re using an NSG or Firewall, add rules or use the AzureActiveDirectory service tag (or explicitly allow FQDNs: login.microsoftonline.com, graph.microsoft.com, sts.windows.net, etc.) • This ensures Grafana can reach the identity provider even though the workspace itself isn’t publicly accessible.
- Verify your private endpoint & DNS setup: • In the Azure portal, go to your Managed Grafana > Networking > Private Access and confirm the endpoint state is “Approved.” • Ensure you’ve integrated with a private DNS zone so that your Grafana hostname resolves correctly inside the VNet.
- Check your Application Gateway HTTP settings: • Make sure you’re forwarding the original Host header (or rewriting back to the Grafana FQDN) so Grafana sees the exact URL you’ve registered in Azure AD. • If the host header is wrong, the redirect URI won’t match what’s in your app registration.
- Double-check your Azure AD app registration : • In Entra ID, under your Grafana enterprise app, verify the Redirect URI exactly matches the Application Gateway URL (including protocol, hostname, and path, e.g., https://grafana.mycompany.com/login/azuread). • If you’ve got multiple environments or funky hostnames, make sure each one is listed.
If you’re still seeing an error after those steps, could you share:
• The exact error message or behavior after you submit credentials
• How your Azure AD app’s redirect URI is configured
• Any NSG/firewall rules you’ve set on the subnet hosting Grafana
• Whether you’ve tested DNS resolution for both the Grafana FQDN and the Entra endpoints from a VM in the same VNet
That info will help narrow it down!
Hope that helps — let me know what you see.
References
- Set up private access in Azure Managed Grafana: https://dori-uw-1.kuma-moon.com/azure/managed-grafana/how-to-set-up-private-access
- Troubleshoot managed private endpoint connections: https://dori-uw-1.kuma-moon.com/azure/managed-grafana/troubleshoot-mpe-connection
- Connecting Grafana to Azure Data Explorer privately: https://dori-uw-1.kuma-moon.com/azure/managed-grafana/how-to-connect-to-data-source-privately
Thanks,
Suchitra.