The Microsoft Entra ID integration connects your <clienta> tenant to SAML-based login.
Purpose
Allow Microsoft Entra-managed users to authenticate to your <clienta> portal using organization SSO policy.
Before you start
- Admin access to Microsoft Entra (Azure portal).
- Users/groups ready to assign to the Enterprise Application.
- In your
<clienta>portal, go to Setup > SSO and copy: ACS URL, SP Entity ID, SP Login URL, and SP Logout URL.
Steps
Step 1: Log into Azure/Entra and create the app
- Sign in to entra.microsoft.com (or Azure portal).
- Go to Microsoft Entra ID > Enterprise applications > New application.
- Choose the Gallery app flow for your org, then create/open the application.
- Open Single sign-on and choose SAML.
Step 2: Configure Basic SAML settings
- Set Identifier (Entity ID) to the SP Entity ID from your
<clienta>Setup > SSO page. - Set Reply URL (Assertion Consumer Service URL) to the ACS URL from your
<clienta>Setup > SSO page. - Set Sign on URL = blank.
- Save.
Step 3: Configure Attributes & Claims
- Open Unique User Identifier (Name ID).
- Set Source = Attribute.
- Set Source attribute =
user.mail. - Set Name identifier format = EmailAddress.
- Save.
Step 4: Configure SAML Certificates signing
- In SAML Certificates, click Edit.
- Set Signing Option =
Sign SAML response and assertion. - Save.
- Download the active Certificate (Base64).
Step 5: Collect Entra IdP values
Copy from Entra app settings:
- Microsoft Entra Identifier
- Login URL
- Certificate (Base64)
Step 6: Add Microsoft provider in your <clienta> portal
- Go to Setup > SSO.
- Click Add and choose Azure.
- Enter:
- Issuer Entity ID = Microsoft Entra Identifier
- SSO URL (IdP Login URL) = Login URL
- X.509 Certificate = Certificate (Base64) you downloaded
- (Optional) Set as primary provider.
- Save and run a login test.
Troubleshooting
- Leave Sign on URL blank. If set incorrectly, users may get
Cannot GET /sso-login. - Use Signing Option =
Sign SAML response and assertion. Response-only or assertion-only can causeInvalid document signature. - Ensure NameID uses
user.mailwhen users are email-based. - Ensure users are assigned in Entra and active in your
<clienta>portal.