
Certified Power Apps Consultant & Host of CitizenDeveloper365
Griffin Lickfeldt (Citizen Developer) published a clear tutorial video explaining how to set up manual authentication inside Copilot Studio, and the piece serves as a practical guide for builders and administrators. The video targets Power Platform users who need to control sign-in flows beyond default configurations. Moreover, it emphasizes hands-on steps such as creating an App Registration and configuring OAuth details in the Azure portal. Consequently, readers gain a concise roadmap for enabling personalized authentication within their Copilot agents.
Importantly, the tutorial distinguishes between using built-in authentication and opting for a manual approach labeled Authenticate manually in settings. Griffin walks viewers through choices like Microsoft Entra ID V2 with federated credentials and variants using client secrets. He explains why teams might choose each option, and he shows how to manage credentials, tokens, and required URLs. Therefore, the video positions manual authentication as a flexible yet deliberate design choice.
Finally, the video contextualizes manual authentication for non-expert builders while still covering technical prerequisites. It explains how authentication scope and permissions surface inside Copilot agents and why those details matter for secure access. In addition, Griffin highlights that changes require republishing the agent to take effect. Thus, the overview sets clear expectations for both effort and outcome.
The tutorial starts with navigating to Settings > Security > Authentication in Copilot Studio, and then selecting the Authenticate manually option. Next, Griffin shows how to create an App Registration in Azure and copy the Client ID into Copilot settings. He also walks through adding federated credentials or client secrets in the Azure portal, and he stresses matching redirect and OAuth URLs to your region.
Furthermore, the video highlights creating a custom scope such as copilot.studio.scope so the agent can request the right permissions. Griffin then demonstrates setting supported account types to include organizational and personal accounts when needed. He also points out that administrators may need to enable tenant-level policies before the agent can use certain features. As a result, these steps help align identity, consent, and governance.
Finally, Griffin reiterates the need to copy generated credentials back into Copilot Studio and to save and publish the agent for changes to apply. He demonstrates testing sign-in flows to confirm User.AccessToken and other context variables populate correctly. He also encourages using federated credentials where possible to reduce secret handling. Therefore, the walkthrough supports a secure setup and reliable token exchange.
One clear benefit is flexibility: teams can integrate multiple identity providers and customize token handling for richer user experiences. Additionally, manual configuration gives developers fine-grained control over scopes, claims, and session behavior that default flows may not expose. However, this control introduces tradeoffs because it increases complexity and requires more careful secret and certificate management. Thus, organizations must weigh customization against maintenance overhead.
Another advantage is support for non-Microsoft OAuth2 providers, which helps organizations serve diverse user bases. Yet, integrating external providers can complicate support and testing across regions and tenants. Moreover, manual flows may demand stricter governance to ensure compliance and auditability. Consequently, teams should plan identity lifecycle, rotation, and incident response as part of deployment.
Finally, using federated credentials offers a security tradeoff by reducing reliance on long-lived client secrets, while requiring robust trust and certificate processes. Conversely, client secrets are simpler to set up but pose higher risk if they are not rotated or stored securely. Therefore, teams must balance operational simplicity against long-term security resilience when choosing an approach.
Griffin calls attention to common pitfalls such as mismatched redirect URLs, missing scopes, and tenant-level restrictions that prevent sign-in flows from working. For that reason, he advises validating every OAuth endpoint and testing across environments before publishing. Moreover, he recommends recording the exact values you apply to avoid copy-paste errors and unexpected behavior.
In addition, administrators should anticipate governance limits from Power Platform and Entra policies that might block manual changes. Thus, early coordination with tenant admins prevents surprises and accelerates rollout. Griffin also suggests making use of descriptive naming conventions for app registrations like CopilotStudioAuthApp to simplify later audits and troubleshooting.
Finally, Griffin encourages logging and monitoring sign-in attempts and token usage so teams can detect anomalies quickly. He notes that republishing the agent is required after authentication changes, so include that step in release checklists. Consequently, these practices reduce operational friction and improve security posture over time.
Overall, the video by Griffin Lickfeldt provides a practical manual for teams who need customized authentication in Copilot Studio, and it pairs actionable steps with governance guidance. Moving forward, organizations should evaluate whether manual setup meets their risk profile and plan automation for secret rotation and federated trust. In addition, teams should document the configuration and test sign-in flows across user types to ensure consistent behavior.
In conclusion, the tutorial offers a balanced guide that highlights benefits, tradeoffs, and common challenges while focusing on achievable steps for builders and administrators. Therefore, teams can use this tutorial as a foundation for secure, tailored sign-in experiences inside Copilot agents. Finally, readers are advised to adopt the demonstrated best practices and to involve tenant administrators early to streamline implementation.
Manual Authentication Microsoft Copilot Studio, How to Setup Manual Authentication Copilot Studio, Copilot Studio manual auth tutorial, Microsoft Copilot Studio authentication guide, Manual auth setup Copilot Studio step by step, Custom authentication for Microsoft Copilot, Copilot Studio token-based authentication, Copilot Studio Azure AD manual setup