Follow the steps below to configure Single Sign-On (SSO) for Safeguard using SAML in Microsoft Entra ID (formerly Azure Active Directory).
Step 1: Create an Enterprise Application
Go to the Microsoft Entra admin center.
Navigate to Applications > Enterprise applications.
Click + New application.
Select Create your own application.
Enter a name (e.g., “Safeguard”) and choose Integrate any other application you don’t find in the gallery (Non-gallery).
Click Create.
Step 2: Set Up Single Sign-On
After the application is created, go to Single sign-on in the left-hand menu.
Select SAML as the sign-on method.
Step 3: Upload Our Metadata File
Click Upload metadata file at the top and select the metadata file we provided.
All necessary fields will be filled in automatically after upload.
Click Save.
Step 4: Configure the SAML Signing Options
Scroll down to the SAML Certificates section.
Click Edit next to the Token signing certificate (pencil icon).
Under Signing Option, select:
- Sign SAML responseSet Signing Algorithm to:
- SHA-256Click Save.
Step 5: Assign Users or Groups to the Application
In the left-hand menu of the application, go to Users and groups.
Click + Add user/group.
Select the users or groups who should have access to the application.
Click Assign.
Only assigned users will be able to sign in via SSO. Make sure to include at least one user for testing in the next step.
Step 6: Share the Federation Metadata URL
In the SAML Certificates section, find the App Federation Metadata Url.
Copy the URL and share it with our support team at [email protected].
Step 7: Test the Sign-In and Finalize Setup
Coordinate with our support team to test the SSO integration.
We’ll verify that the SAML response is received correctly and that user access works as expected.
Once the test is successful, we’ll finalize the configuration on our side and confirm that everything is ready for use.
If you haven’t already, please contact our support team at [email protected] to schedule the test.