Azure Entra ID (Azure AD) – SAML SSO Configuration Guide Step 1: Create an Enterprise Application Go to https://entra.microsoft.com In the left menu, click "Applications" → "Enterprise applications" Click "+ New application" Select "Create your own application" Enter a name (e.g. Sadevio Visitor SSO ) Choose "Integrate any other application you don't find in the gallery" Click Create Step 2: Add entra information to sadevio https://help.sadevio.com/books/entra-ad-sso-saml/page/sadevio-configuration Step 3: Configure SAML-based Sign-On In the new app, go to "Single sign-on" Select SAML as the sign-on method Fill out the Basic SAML Configuration with the following values: Field Value Identifier (Entity ID) https://cloud.sadevio.com/sadevio_module/api/localhost/saml/{tenant_id} Reply URL (ACS URL) https://cloud.sadevio.com/sadevio_module/api/localhost/saml/callback?tenant= {tenant_id} Sign on URL https://cloud.sadevio.com Relay State (Optional) (Leave empty) Logout URL (Optional) https://cloud.sadevio.com/adevio_module/api/localhost/saml/logout?tenant= {tenant_id} 💡 You can copy and paste these values from the configuration form inside the Sadevio admin panel. Step 4: Configure User Attributes & Claims Click Edit under Attributes & Claims Ensure the following claims are included (default setup should already have them): email → user’s email address givenname → user’s first name surname → user’s last name name or userprincipalname → unique identifier (used as NameID) ℹ️ The NameID claim should ideally be set to the user’s email address (you can adjust this in "Unique User Identifier"). Verification certificates. On the sadevio platform, you can download the certificate to sign the authentication request. Download the certificate and upload it to entra.microsoft.com Select "Require verification certificats" and upload the sadevio certificate Step 5: Download Certificate and SSO URL Under SAML Signing Certificate , download the following: Certificate (Base64) – This is the X.509 Certificate Also copy the Login URL – This is the Azure SSO URL (Optional) Copy the App Federation Metadata URL – used if you want dynamic configuration Step 6: Download Certificate and SSO URL Under SAML Signing Certificate , download the following: Certificate (Base64) – This is the X.509 Certificate Also copy the Login URL – This is the Azure SSO URL (Optional) Copy the App Federation Metadata URL – used if you want dynamic configuration Step 7: Assign Users In Azure, go to the Users and groups section of the Enterprise App Click + Add user/group Select the users or groups who should be able to sign in using SSO Click Assign