Skip to main content

Azure AD (Microsoft Entra ID) <> Enterpret: End-to-End SSO Setup Guide (SAML)

Configuring Azure SAML Application to sign-in to Enterpret

Team Enterpret avatar
Written by Team Enterpret
Updated yesterday

Written by Team Enterpret

Last updated: Feb 2026


Overview

Single Sign-On (SSO) allows users to log in to Enterpret using their organizationโ€™s Microsoft Azure AD (Microsoft Entra ID) credentials. Enterpret supports SAML 2.0โ€“based SSO, enabling centralized authentication and easier access management.

This guide walks you through the complete end-to-end process to configure SAML SSO between Azure AD and Enterpret, including testing, attribute configuration, and optional IDP-initiated login.


๐Ÿ” Understanding SAML Login Flows (Read This First)

Azure AD supports both SP-initiated and IDP-initiated SAML flows. Understanding the difference avoids most setup issues.


SP-Initiated SSO

What it is

  • Login starts from Enterpret

  • User is redirected to Azure AD to authenticate

Flow

  1. User opens the Enterpret login page

  2. Clicks Sign in with SSO

  3. Redirected to Azure AD

  4. Authenticates

  5. Redirected back to Enterpret

Why this matters

  • โœ… Does not require RelayState

  • โœ… Simplest and safest flow

  • โœ… Must work before enforcing SSO

๐Ÿ‘‰ Always test this flow first.


IDP-Initiated SSO

What it is

  • Login starts from Azure AD

  • User clicks the Enterpret app in the Microsoft My Apps portal

Key difference

  • โ— Requires RelayState

  • Without it, Enterpret cannot determine the correct workspace


What Is RelayState?

RelayState is a value generated by Enterpret that tells the system:

โ€œThis user belongs to this specific Enterpret workspace.โ€

  • SP-initiated SSO โ†’ RelayState not required

  • IDP-initiated SSO โ†’ RelayState required


Prerequisites

Before starting, ensure you have:

  • Admin access to Enterpret

  • Admin access to Azure AD (Microsoft Entra ID)

  • Permission to create Enterprise Applications

  • User emails in Enterpret that exactly match Azure AD emails


High-Level Setup Flow

  1. Create a non-gallery Enterprise Application in Azure

  2. Configure SAML settings

  3. Configure email attribute claims

  4. Copy Metadata URL

  5. Configure SSO in Enterpret

  6. Test SP-initiated login

  7. Enable IDP-initiated login


Step 1: Create an Enterprise Application in Azure AD

  1. Log in to the Azure Portal

  2. Navigate to Microsoft Entra ID โ†’ Enterprise Applications

  3. Click New application

  4. Click Create your own application

  5. Enter:

    • Name: Enterpret SAML App

    • Application type:

      Integrate any other application you donโ€™t find in the gallery (Non-gallery)

  6. Click Create

  7. Add Enterpret Logo [you can upload the Enterpret logo, which you can find it here]


Step 2: Configure SAML Settings

  1. In the newly created app, go to Manage โ†’ Single sign-on

  2. Select SAML


Basic SAML Configuration

Enter the following values exactly:

Field

Value

Identifier (Entity ID)

urn:amazon:cognito:sp:us-east-2_kLiRrPBis

Reply URL (ACS URL)

https://enterpret-prod.auth.us-east-2.amazoncognito.com/saml2/idpresponse

Sign-on URL

Leave empty

Logout URL

Leave empty

Default RelayState

Leave empty (for now)

โš ๏ธ IDP-initiated login requires RelayState, which is covered later.


๐Ÿ”‘ Attribute & Claims Configuration (Very Important)

Azure AD does not always send email by default in the way Enterpret expects. Correct claim mapping is critical.


Step 1: Verify the Correct Email Source Attribute

Before adding claims, verify where Azure stores user email.

  1. Go to Microsoft Entra ID โ†’ Users

  2. Select a sample user

  3. Check:

    • User Principal Name (UPN)

    • Mail

Choose one:

  • If UPN is always an email, use user.userprincipalname

  • If Mail contains the correct email, use user.mail

๐Ÿ‘‰ Confirm this with your IT admin before proceeding.


Step 2: Add Email Claim

  1. In the app, go to Attributes & Claims

  2. Click Edit

  3. Click Add new claim

  4. Enter:

    • Name: email

    • Source: Attribute

    • Source attribute:

      user.userprincipalname or user.mail (based on verification)

    • Namespace: Leave empty

  5. Click Save


Why the Email Claim Matters

Enterpret uses the email claim as the unique identifier to:

  • Identify the user

  • Match them to an existing Enterpret account

  • Grant access to the correct workspace

If the email:

  • Is missing

  • Is mapped incorrectly

  • Does not match Enterpret

โžก๏ธ Login will fail even if Azure authentication succeeds.


Step 3: Copy Azure Metadata URL

  1. Go to Single sign-on โ†’ SAML Certificates

  2. Copy the App Federation Metadata URL

Youโ€™ll use this in Enterpret.


Step 4: Configure SSO in Enterpret

  1. Log in to Enterpret

  2. Click Organization logo โ†’ Settings โ†’ Access Settings โ†’ SSO & SCIM Settings

  3. Click Configure

  4. Select SAML

  5. Paste the Metadata URL

  6. Click Submit

SSO is now configured ๐ŸŽ‰


Step 5: Test SP-Initiated SSO

  1. Log out of Enterpret

  2. Go to Enterpret login page

  3. Click Sign in with SSO

  4. Enter your email

  5. Authenticate via Azure AD

  6. Confirm successful login

โœ… If this works, your SSO setup is correct.


Step 6: Enable IDP-Initiated Login (Azure My Apps)

Make sure you have assigned Enterpret app to relevant users

  1. Get RelayState from Enterpret

    • Click Organization logo โ†’ Settings โ†’ Access Settings โ†’ SSO & SCIM Settings

    • Copy RelayState


2. Add RelayState in Azure

  1. In Azure AD, open the Enterpret app

  2. Go to Single sign-on โ†’ Basic SAML Configuration

  3. Paste RelayState into Default RelayState

  4. Save

Users can now launch Enterpret from the Azure My Apps portal.


Troubleshooting Checklist

Before contacting support, verify:

  • Emails match exactly in Azure AD and Enterpret

  • email claim exists and maps correctly

  • User is assigned to the Enterprise Application

  • SP-initiated login works

  • Metadata URL is valid

  • RelayState is configured (for IDP-initiated login)


FAQs

  1. Azure login succeeds, but Enterpret login fails. Why?

    Most commonly due to:

    • Missing or incorrect email claim

    • Email mismatch between Azure and Enterpret

  2. SSO works from Enterpret, but not from Azure My Apps. Why?

    Youโ€™re likely missing RelayState. IDP-initiated SSO requires it.

  3. Is NameID enough for Enterpret?

    No. Enterpret explicitly reads the email claim.

  4. Can we use a different attribute instead of email?

    No. Email is the unique identifier used by Enterpret.

  5. Should we use Azure SAML or Okta OIDC?

    • OIDC (if available): simpler, fewer edge cases

    • Azure SAML: recommended when Azure AD is the primary IdP

Need Help?

If youโ€™re unsure about:

  • Email claim mapping

  • RelayState configuration

  • Azure SAML behavior

Reach out to the Enterpret team โ€” weโ€™re happy to help you get SSO running smoothly ๐Ÿš€

Did this answer your question?