Learn how to configure Single Sign-On using SAML protocol in Azure Active Directory to authenticate users to your Staffbase platform.
In this article, you will learn how to set up Single Sign-On (SSO) using the SAML protocol in Azure Active Directory (Azure AD). SSO is an authentication method that allows users access to multiple applications with a single account. This will allow you to onboard your users using SSO and let them access the Staffbase platform using the same credentials they use to access other platforms in your organization.
- You have an Azure AD tenant.
- You have one of the following permissions to configure provisioning in Azure AD:
- Application Administrator
- Cloud Application Administrator
- Global Administrator
You need to create an enterprise application in Azure AD to set up SSO.
- In Microsoft Azure, under Azure services, click Azure Active Directory.
- Navigate to Enterprise applications.
- Click New application.
- Click Create your own application.
The Create your own application dialog opens. - Provide a name for the application. For example, Staffbase SSO or something similar to help you instantly identify the application.
- Select Integrate any other application you don't find in the gallery (Non-gallery).
- Click Create.
You have created an application to authenticate users using SSO.
After creating the enterprise application, you can decide on which Azure AD users need access to the Staffbase platform using SSO.
- In the enterprise application you created, click Users and groups.
The Users and groups page opens.
Click Add user/group.
Click None Selected.
The Users and groups dialog opens.Search for the user or group you want to add and click Select.
Click Assign.
You have assigned users or groups to the application.
Once you have created the application, you need to define the SAML protocol.
Learn how the Microsoft identity platform uses the SAML protocol.
- In the enterprise application, navigate to Overview.
- Under Set up single sign on, click Get Started.
- Select SAML as the single sign-on method.
The Set up Single Sign-On with SAML page opens.
To continue the setup process, you will need to work closely with the Staffbase Support team. First, contact the team and inform them that you're setting up SSO with Azure AD. You will receive the information needed to proceed with the setup and have to provide them with the information listed below.
To continue setting up SSO with SAML, you need to:
You will receive the following to complete the SSO setup:
- Reply URL (Assertion Consumer Service URL): The Reply URL directs Azure AD where to send its SAML Response after authenticating a user.
- Identifier (Entity ID): The Identifier acts as a unique identifier for your Staffbase platform domain in Azure AD.
Provide the following information to Staffbase:
- App Federation Metadata Url

- Your Azure AD session lifetime
- On-demand provisioning with SSO
If you want to use SSO for on-demand provisioning, you need to configure additional fields for SAML Claims. You need to inform the Staffbase Support team the following information, so that they add it to their system:- The profile field you would like the field mapped to
- Any additional claims you have added
After receiving the information from Staffbase, you can complete the SSO configuration.
- In the Set up Single Sign-On with SAML page, click Edit under Basic SAML Configuration.
- Enter the Identifier (Entity ID) and Reply URL (Assertion Consumer Service URL) you received from Staffbase.
- Under SAML Signing Certificate, click Edit.
The Attributes & Claims page opens.
At minimum, you need the following claims configured:
- Unique User Identifier (Name ID)
- http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
- http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
- http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname
- Click Add new claim.
The Manage claim dialog opens.
- Provide a name and assign a Source attribute for the claim.
The values are auto-filled based on your enterprise application and Azure AD tenant.
The values are auto-filled based on your enterprise application and Azure AD tenant.
- Under Test single sign-on, click Test.
- Select a way to test sign in and click Test sign in. The sign in page opens for you to test.
- Ensure the sign in functions as expected.
After testing the SSO authentication works as expected, you can add all users in Azure AD to the enterprise application.
In the enterprise application you created, click Properties.
Set Assignment required? to No.
Click Save.
You have configured and enable SSO for your Staffbase platform.