Skip to content

Azure AD SAML

Step-by-step guide to configure Single Sign-On with Microsoft Entra ID as the identity provider

This guide walks you through configuring Microsoft Entra ID as your SAML identity provider for the application you are onboarding, enabling secure Single Sign-On for your users. You’ll learn how to set up an enterprise application, configure SAML settings, map user attributes, and assign users to the application. By following these steps, your users will be able to seamlessly authenticate using their Microsoft Entra ID credentials.

  1. Sign into the SSO Configuration Portal, select Microsoft Entra ID, then SAML, and click on Configure

    Under Service Provider Details, click on Download Metadata XML

    Download Metadata XML

  1. Login to Microsoft Entra ID in the Microsoft Azure Portal. Select the option for Entra ID application and locate the Enterprise Applications tab

    Locate Enterprise applications

  2. In the Enterprise Applications tab New Application in the top navigation bar

    Click on New application

  3. Click on Create your own Application and give your application a name

    Select the Integrate any other application you don’t find in the gallery (Non-gallery) option. Click on Create

    Create a new application on Entra ID

  1. Locate the Single Sign-On option under Manage, and choose SAML

    Locate SAML under Single sign-on

  2. Click on Upload metadata file. Upload the Metadata XML file downloaded in step 1

    Click on Upload metadata file

  3. Click on Save

    Save button

  1. Under Attributes & Claims, click on Edit

    Click on Edit

  2. Check the Attribute Mapping section in the SSO Configuration Portal, and carefully map the same attributes on your Entra ID app

    SSO Configuration Portal Microsoft Entra ID

  1. Go to the Users and groups tab, and click on Add user/group

    Here, please select all the required users or user groups that need login access to this application via Single Sign-On

    Assigning users and groups to your application

  1. Under SAML Certification, copy the link under App Federation Metadata URL on Entra ID

    Copy App Federation Metadata URL

  2. Under Identify Provider Configuration, select Configure using Metadata URL, and paste it under App Federation Metadata URL on the SSO Configuration Portal

    Paste App Federation Metadata URL

Click on Test Connection. If everything is done correctly, you will see a Success response as shown below.

Test your SAML application for SSO

Click on Enable Connection. This will let all your selected users login to the new application via your Microsoft Entra ID SSO.

Enable SSO on Entra ID

With this, we are done configuring your Microsoft Entra ID application for an SSO login setup.