How to Configure SAML SSO with Microsoft Entra ID [Step-by-Step Guide]

Modified on Thu, 14 May at 4:11 PM

Single Sign-On (SSO) allows your users to log in securely to Techdinamics applications using their existing company credentials, simplifying the user experience and centralizing access control.


This guide explains how to configure a SAML 2.0 connection between your Microsoft Entra ID (formerly Azure AD) and Techdinamics products.

 

 
NoteThis guide requires administrative access to your organization's Microsoft Entra ID center. Ensure you complete all steps and send the final metadata file to your Techdinamics representative to finalize the integration. 
 

 

TABLE OF CONTENTS

 

Creating the Enterprise Application


To begin the integration, you must create a dedicated application within your Microsoft environment.


Step 1Access your Microsoft Entra admin center.

 

Step 2Navigate to Enterprise applications from the left menu under the Entra ID section.

 

 

Step 3Click New application at the top of the screen.

 

 

Step 4Click Create your own application to open the side panel.

 

 

Step 5Enter a descriptive name, such as Techdinamics SSO, in the provided field.

 

Step 6Select the option to Integrate any other application you don't find in the gallery (Non-gallery).

 

Step 7Click Create to initialize the application.

 

 

Configuring Basic SAML SSO


Once the application is created, you must input the specific routing coordinates for the Techdinamics Amazon Cognito environment.


Step 1Select Single sign-on from the left menu under the Manage section of your new application.

  

 

Step 2Select the SAML tile to set it as your sign-on method.

 

 

Step 3Click Edit in the Basic SAML Configuration box.

 

 

Step 4Add exactly the following Identifier (Entity ID):

 

urn:amazon:cognito:sp:us-east-1_nBt9YLKW6

 

Step 5Add exactly the following Reply URL (Assertion Consumer Service URL)

 

https://techdinamics-unified-new.auth.us-east-1.amazoncognito.com/saml2/idpresponse

 

Step 6Add exactly the following Sign on URL

 

https://techdinamics-unified-new.auth.us-east-1.amazoncognito.com/login?response_type=code&client_id=58aqa5kabg52mmsbejrjgll3ua&redirect_uri=https://auth.techdinamics.io/signin-oidc

 

Step 7Click Save at the top of the panel and close the configuration window.

 

 

 
WarningThe Identifier (Entity ID), Reply URL (ACS URL), and Sign on URL values are specific to the Techdinamics Amazon Cognito environment and must be entered exactly as shown. Incorrect values will prevent SAML authentication from functioning correctly. 
 

 

Configuring Attributes and Claims


You must configure the SAML application to send specific user data (claims) so Techdinamics can correctly identify the user logging in.


Step 1Scroll down to the Attributes & Claims box and click Edit.

  

 

Step 2Ensure the Name ID and Email claims are mapped to a stable, unique email identifier (e.g., user.mail or user.userprincipalname).

 

Step 3It is highly recommended to configure the following additional claims for proper profile creation:
  • given_name: Mapped to user.givenname
  • family_name: Mapped to user.surname
  • name: Mapped to user.displayname

 

Step 4Click Save once all required claims are mapped.

 

Assigning Users or Groups


Before testing the application, you must authorize specific users in your organization to access it.


Step 1Navigate to Users and groups under the Manage section in the left menu.

 

Step 2Click Add user/group and select the appropriate personnel.

 

Step 3For initial testing, we recommend assigning at least:
  • One Administrator user.
  • One Standard user.
  • One user with your normal MFA/Security policy applied.

 

Step 4Click Assign to save your selections.

 

Providing Metadata to Techdinamics


To complete the setup on our side, you must extract your configuration details and send them securely to our team.


Step 1Navigate back to the Single sign-on page.

 

Step 2Scroll down to the SAML Certificates section.

 

Step 3Locate the Federation Metadata XML row and click Download.

 

 

Step 4Email the downloaded XML file to your assigned Techdinamics contact.

 

Step 5In your email, you must also include the following critical details:
  • A Test user email (e.g., user@yourcompany.com).
  • Your authorized Email domain(s) (e.g., yourcompany.com).
  • Any special Claim names if you altered them from the defaults requested above.
  • Specific Group/Role claim details only if role-based access is explicitly required for your setup.

 

Your application is now configured on the Microsoft side. Once Techdinamics processes your metadata, our team will contact you to perform a live test and validate the SSO login flow.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article