Skip to main content
All CollectionsSetup for Admins
Microsoft Azure SAML SSO Setup
Microsoft Azure SAML SSO Setup

SAML authentication with Microsoft Entra ID

James Graham avatar
Written by James Graham
Updated over a week ago

1. Initial Setup by Jiminny

Via your CSM, request for SSO to be enbled. Jiminny will then provide you with specific URLs to authorize the integration based on your data hosting region (US or EU).

2. [Optional] Authorize Enterprise Application in Azure

If you have not already done so, please grant access to Jiminny to your Azure Tenant. This step optionally grants consent but will install the Enterprise Application for configuration and provide us with your Tenant ID.

3. Configure Enterprise Application in Azure

  1. Log into your Entra Admin Center and select Applications > Enterprise applications

  2. Click + New application > Create your own application

  3. Give the application a name such as Jiminny SSO, keep the default settings and click Create

  4. In the application, select Single sign on and select SAML

  5. Edit the Basic SAML Configurations and enter the following values:

    1. Identifier (Entity ID): [provided by Jiminny]

    2. Reply URL (Assertion Consumer Service URL): [provided by Jiminny]

  6. Click Save

4. Configure Attributes and Claims

If you wish to use Email Address as the Name ID Format (instead of UPN):

  • Name identifier format: Email address

  • Source: set to Attribute

  • Source attribute: user.mail

  • Delete any Additional claims

Please let Jiminny know your preferred Name ID Format.

5. Assign Users & Groups

In the Users and Groups section, add the users or groups you want to use SSO

6. Final Setup by Jiminny

Jiminny will complete the setup by configuring the SAML2 tenant in the Platform including attribute mapping.

Did this answer your question?