Entra ID
Follow the steps below to integrate Microsoft Entra ID (formerly Azure AD) for Single Sign On (SSO).
Important
Only users with "Organization Admin" privileges can configure IdP integrations.
Step 1: Create Identity Provider¶
- Login into the web console as an Organization Admin.
- Navigate to System -> Identity Providers.
- Click New Identity Provider.
- Provide a name, select Custom from the IdP Type drop down.
- Enter the Domain for which you would like to enable SSO.
Important
Within an org, the domain of an IdP cannot be used for another IdP. A domain existing in an org can be used in multiple orgs (for one IdP in each org).
- Enter an Admin Email.
- Optionally, toggle Encrypted SAML Assertion if you wish to send/receive encrypted SAML assertions.
- Provide a name for the Group Attribute Name (for example,
OrgRoles). - Optionally, toggle Include Authentication Context if you wish to send/receive auth context information in assertion.
- Click Update & Continue.

Important
Encrypting SAML assertions is optional because privacy is already provided at the transport layer using HTTPS. Encrypted assertions provide an additional layer of security ensuring that only the SP can decrypt the SAML assertion.
Step 2: View Service Provider Details¶
The IdP configuration wizard will display critical information that you need to copy/paste into your Entra ID Enterprise Application. Provide the following information to your Entra ID administrator:
- Assertion Consumer Service (ACS) URL
- SP Entity ID
- Name ID Format

Step 3: Create the Application in Entra¶
- Login into the Entra admin center as an Administrator.
- Navigate to Identity > Applications > Enterprise applications and select New application.
- Select Create your own application.

- Select Non-gallery application and click Create.

Step 4: Configure SAML¶
- In the application configuration page, go to Single sign-on and select SAML.

- Click Edit for Basic SAML Configuration.

- Copy/Paste the Entity ID from Step 2 into the Identifier.
- Copy/Paste the ACS URL from Step 2 into the Reply URL.
- Click Save.

- Click Edit User Attributes & Claims.

- Add a new claim:
- Name: the Group Attribute Name from Step 1 (e.g.,
OrgRoles) - Source attribute:
user.assignedroles
- Name: the Group Attribute Name from Step 1 (e.g.,
- Save the settings.

Step 5: Assign Users an App Role¶
The controller manages permissions based on roles or group names. The "Group" configuration step ensures that Entra ID sends the groups or roles the user belongs to as part of the SSO process. The controller uses this information to map users to the correct group/role.
Choose one of the following options:
- Step 5.1: Use App Roles and a roles claim
- Step 5.2: Use a Group Claim for the Group Attribute
Step 5.1: Configure an App Role¶
Create App Role
- Login into the Entra admin center.
- Go to Identity -> Applications -> App registrations -> All applications.
- Select your application.
- Under App roles, click + Create app role.
- Enter a Display name (e.g.,
org-admins). - Select Users/Groups as Allowed member types.
- Set the Value (e.g.,
org-admins). - Provide a description.
- Enable the app role.
- Click Apply.

Assign User to App Role
- Navigate to Enterprise applications > All applications.
- Select your application.
- Under Manage, select Users and groups.
- Click Add user.
- Select the user(s) or group(s), then select a role.
- Click Assign.

Step 5.2: Configure Group Claim for Users and Groups Synced from Active Directory¶
Assign AD Users and Groups to the App
- Go to Enterprise applications > [Your App] > Users and groups and click Add user/group.

- Select the users or groups synced from Active Directory.

- Assign a role for the selected groups.

Add Group Claims Using AD Group Names
- Go to Enterprise applications > [Your App] > Single sign-on.
- Click Edit under User Attributes & Claims.
- Select Add a group claim.
- Choose
sAMAccountNameas the source attribute. - Provide the Name matching the Group Attribute from Step 1.
- Save the settings.

Groups in Web Console
Groups with identical names to Active Directory groups must be created in the web console. Ensure these are mapped to the appropriate Projects with the correct privileges.

Step 6: Specify IdP Metadata¶
- In the Entra Admin Center, browse to Enterprise applications > [Your App] > Single sign-on.
- Copy the App Federation Metadata URL from the SAML Certificates section.

- In the web console’s IdP configuration wizard, paste the URL into the Identity Provider Metadata field.
- Complete IdP Registration.

- Once this process is complete, you can view details about the IdP configuration on the Identity Provider page.