Configuring Vouched SSO with Azure AD / Microsoft Entra ID
Configure Azure Active Directory (Microsoft Entra ID) as your SAML 2.0 identity provider for Vouched SSO using your Vouched SP metadata values.
Configure Azure Active Directory (Microsoft Entra ID) as your SAML 2.0 identity provider (IdP) for Vouched SSO.
This guide walks through configuring Azure AD / Microsoft Entra ID for Vouched SSO.
Prerequisites
Before you begin:
- Complete Steps 1–2 in the SSO / SAML Configuration guide.
- Copy your Vouched SP metadata values from the IdP Configuration section.
- Sign in to the Azure portal with permission to create and manage enterprise applications.
Configure Azure AD / Microsoft Entra ID for Vouched SSO
1. Create an enterprise application
- Log in to the Azure Portal.
- Navigate to Azure Active Directory > Enterprise Applications.
- Click New application.
- Click Create your own application.
- Give the app a name, such as
Vouched. - Select Integrate any other application you don't find in the gallery.
- Click Create.
2. Configure single sign-on
- In your new application, click Set up single sign-on.
- Select SAML.
- In the Basic SAML Configuration section, click Edit.
- Enter the following values from your Vouched IdP Configuration section:
| Azure AD field | Value |
|---|---|
| Identifier (Entity ID) | Use the Entity ID from Vouched |
| Reply URL (Assertion Consumer Service URL) | Use the ACS URL from Vouched |
| Sign on URL | Use the Sign-On URL from Vouched |
- Click Save.
3. Configure attributes and claims
- In the Attributes & Claims section, click Edit.
- Ensure the following claims are present. Add or edit them if needed:
| Claim name | Source attribute |
|---|---|
firstName | user.givenname |
lastName | user.surname |
Note on NameID: By default, Azure AD uses the user's UPN (user principal name) as the NameID. If your users' UPNs do not match their email addresses, update the Unique User Identifier (Name ID) claim to use user.mail instead.
4. Retrieve your Azure AD metadata
- In the SAML Signing Certificate section, find the Federation Metadata XML row.
- Click Download to get the metadata XML file, or copy the App Federation Metadata Url.
- Paste the URL into the Metadata URL field in Vouched, which is recommended, or upload the XML into the Metadata XML field.
- Click Save.
5. Assign users
Navigate to Users and groups in your Enterprise Application and assign the users or groups who should have access to Vouched through SSO.
Need help?
Contact Vouched support with a description of the issue and the step where it occurs.
Updated 1 day ago
