Skip to main content
All CollectionsEnterprise
Azure Active Directory Cognito Integration using SAML
Azure Active Directory Cognito Integration using SAML
Karen avatar
Written by Karen
Updated over a month ago

Whether you're new to these technologies or looking for specific guidance, you’ll find the key insights and tips you need for a successful integration. Let’s get started!

Things to do:

​1. Enable SAML-based SSO for Enterprise apps in Azure AD.

2. Create an app, set up SAML SSO, configure settings, and manage users.



Follow these steps to seamlessly create a new Enterprise application in the Azure Entra ID admin center:

1-Open the Azure Entra ID ((formerly Azure Active Directory) admin center by navigating to the following website:https://entra.microsoft.com/.

2-Log in using your admin credentials.

3-Click "All services" and select "Azure Entra ID" from the list of available services.

4-Select “Applications” and Select "Enterprise applications" from the left "Azure Entra ID" menu.

5-Click "New application" to create a new custom Enterprise application.

6-Click “Create your own application”, put the name of the application i.e “Simplified” and choose “Integrate any other application you don’t find in the gallery”



7-Select "Set up Single Sign-On" and choose "SAML" as the authentication method.



8-In the "Basic SAML Configuration" section, add the following details:



Identifier (Entity ID): urn:amazon:cognito:sp:us-west-2_DsJFDTaX7

Reply URL (Assertion Consumer Service URL): https://auth.simplified.com/saml2/idpresponse







9- To claim under "Attributes & Claims," you need to have four attributes: A unique User Identifier, emailaddress, givenname and familyname.

The Unique User Identifier attribute is a required claim and should not be changed.

Under "Attributes & Claims", map the attributes as follows:

  • Ensure the emailaddress attribute is mapped to the source attribute that contains the organization mail allocated to the user.

  • Add familyname attribute mapped to source attribute with familyname

  • Add givenname attribute mapped to source attribute with givenname

Please copy the "App Federation Metadata URL" found under the "SAML Certificate" section and provide us with the URL along with your organization's name.





Once the application is created, manage the users who have login access to your app by navigating to the "Users and Groups" tab.



Did this answer your question?