In the search bar at the top, type "Microsoft Entra ID" and select it
In the left sidebar, click Enterprise applications
Step 1.2: Create New Application
Click + New application (top left)
Click + Create your own application
Enter the application name: stacksync-example
Select: "Integrate any other application you don't find in the gallery (Non-gallery)"
Click Create
Wait a few seconds for Azure to create the application.
Part 2: Configure SAML Single Sign-On
Step 2.1: Start SAML Setup
In your stacksync-example enterprise application, click Single sign-on in the left sidebar
Click the SAML tile
Step 2.2: Download Azure Metadata
Before configuring anything, download your Azure metadata file:
Scroll down to section "3. SAML Certificates"
Under "Token signing certificate", click Edit (pencil icon on the right)
Click the three dots menu (...) next to the Active certificate
Select "Download federated certificate XML" from the dropdown menu
Save the file (e.g., AzureMetadata.xml)
Step 2.3: Configure SSO in your workspace
The SSO configuration should only be done once per company domain. All domains will be connected under the same SSO configuration
Navigate to your workspace settings
Choose Azure AD (Entra ID) as your identity provider
Upload the federated certificate XML file you downloaded from Azure in the step above
You can choose to "Restrict login to SSO only for this domain" using the checkbox. This will make it so users with this domain will only be able to login via the SSO flow
Click continue
You should now see a page with all the necessary info to continue the setup in Azure.
Step 2.4: Configure Basic SAML Settings
Once you have terminated the SSO configuration in your workspace you can continue with the setup in Azure:
Go back to your Azure SAML setup page
Click Edit on section "1. Basic SAML Configuration"
Fill in the values provided by stacksync support:
Identifier (Entity ID):
(Use the exact value from the above step)
Reply URL (Assertion Consumer Service URL):
(Use the exact value from the above step)
Sign on URL (optional):
Click Save
Close the panel by clicking X
Step 2.5: Configuring email claim
This is needed because some emails could have upper case letter making the SSO login not work as expected.
Edit the Attributes & Claims section
Click on the user.mail claim to start editing it
Change the source radio button to Transformation (this action should open a side pabel)
In the Transformation field drop down choose ToLowercase()
In the Attribute name field dropdown choose user.mail
Click add and then Save on the main page
Part 3: Set Up Automatic User Provisioning (SCIM)
Step 3.1: Generate a api token for your workspace
In your stacksync workspace settings scroll down to "Stacksync Workspace API Key"
Create a api key for scim use.
Step 3.2: Enable Automatic Provisioning
In your stacksync enterprise application, click Provisioning in the left sidebar