Microsoft Entra ID - SAML - Configuration
Important Note
The instructions in this article cover a third-party app and may not reflect the latest version. Please use these instructions as a guide to complete the task, but be aware that some screens, field names, and steps may have changed.
Overview
This article explains how to integrate Microsoft Entra ID with Flosum Cloud Apps using SAML authentication to enable Single Sign-On (SSO), allowing users to access the platform seamlessly with their existing credentials. If you prefer to integrate Entra ID via OIDC, refer to the following article.
For more general instructions about adding an Identity Provider, see the following article.
Customer-Hosted
Customers who host Flosum Apps on their own infrastructure will have a custom URL for logging into their apps. When using this documentation, replace any Flosum Hosted URLs with your own URLs.
Configure Entra ID
Configure Single Sign On
Click Single sign-on under the Manage section in the left sidebar menu.
Click SAML.
Basic SAML Configuration
Click Edit for Basic SAML Configuration.
Click Add identifier and enter a unique identity for this SSO. This can be any unique string value.
Click Add reply URL and enter the SAML URL for your region from the table below.
United States
https://global-us.flosum.app/api/v1/saml/acs
Germany
https://global-de.flosum.app/api/v1/saml/acs
Japan
https://global-jp.flosum.app/api/v1/saml/acs
Australia
https://global-au.flosum.app/api/v1/saml/acs
Click Save.
Attributes & Claims
Click Edit for Attributes & Claims.
Click Add new claim to add each of the following claims.
firstName
user.givenname
lastName
user.surname
user.mail
uniqueUserId
user.userprincipalname
The uniqueUserId claim can be mapped to any user attribute that is both unique and constant.
SAML Certificates
Token signing certificate
Don't edit the Token signing certificate.
A custom signing certificate can be used for the Token signing certificate if required by security or compliance policies.
Verification certificates (optional)
(Optional) Verification certificates aren't required to work with Flosum SSO. Configure this setting only if required by your security or compliance policies.
If you enable Require verification certificates:
Generate a private/public key pair.
Upload the Service Provider's public certificate using the Upload certificate button.
Click Save.
Create Identity Provider in Global Settings
Follow the general instructions in the article below to get started creating a SAML Identity Provider.
Complete the Basic information section.
Select OPEN_ID for the identity provider Type.
Complete the Button information section.
(Optional) Complete the Group information section.
Complete SAML 2.0 Information Fields
Copy the information from your Entra ID application into the SAML 2.0 Information section. The first screenshot below shows which Entra ID application fields to copy. The table explains where to enter this information. The final screenshot shows a completed identity provider for an Entra ID SAML application.

Issuer
Basic SAML Configuration → Identifier (Entity ID)
Entity ID
Set up {application name} → Microsoft Entra Identifier
Click the Copy icon to copy this link.
Identity Provider Sign Certificate
SAML Certificates → Token signing certificate → Certificate (Base64)
Click Download to download the certificate. Once downloaded, click Identity Provider Sign Certificate and upload it.
Name ID format
Leave blank
Identity Provider Login URL
Set up {application name} → Login URL
Click the Copy icon to copy this link.

SAML Signed Request Enabled
If SAML Certificates → Verification certificates (optional) → Required is Yes:
Check the SAML Signed Request Enabled checkbox.
Complete the fields in the table below.
Auth Sign Certificate
Click to upload the public certificate that corresponds to the verification certificate.
Auth Private Key
Click to upload the private key that matches the public certificate.
Auth Private Key Password
Enter the passphrase for the private key if encrypted.
Auth Sign Algorithm
Leave blank (or specify if required).
Assertion Encryption Enabled
If Assertion Encryption is enabled in Entra ID:
Check the Assertion Encryption Enabled checkbox.
Complete the fields in the table below.
Encryption Certificate
Click to upload the public certificate that is used for assertion encryption.
Encryption Private Key
Click to upload the private key that pairs with the public certificate.
Encryption Private Key Password
Enter the passphrase for the private key if encrypted.
Save and Test
For instructions on logging in with SSO, see the following article.
Click Save to save the identity provider.
To test, open an incognito window.
Start logging in to Global Settings with your tenant name.
If the identity provider was configured successfully, you should see the SSO button you created.

Last updated
Was this helpful?