Microsoft Entra ID (Azure AD) SSO Setup
Configure SAML-based Single Sign-On with Microsoft Entra ID (formerly Azure Active Directory).
Prerequisites
- Microsoft Entra ID tenant with admin access
- Propper organization admin access
- Users must have Microsoft 365 or Entra ID accounts
Step 1: Create an Enterprise Application
- Sign in to the Microsoft Entra admin center
- Navigate to Identity > Applications > Enterprise applications
- Direct link: Enterprise Applications
- Click + New application
- Click + Create your own application
- Enter a name (e.g., "Propper")
- Select Integrate any other application you don't find in the gallery (Non-gallery)
- Click Create
Step 2: Configure SAML Single Sign-On
- In your new application, go to Single sign-on in the left menu
- Select SAML as the single sign-on method
- In the Basic SAML Configuration section, click Edit
- Enter the following values:
| Field | Value |
|---|---|
| Identifier (Entity ID) | urn:propper:sp:auth |
| Reply URL (ACS URL) | https://auth.propper.ai/saml/acs |
| Sign on URL | https://app.propper.ai/login |
| Logout URL | https://auth.propper.ai/saml/slo |
- Click Save
You can add multiple Identifier values if needed. The first one will be the default.
Step 3: Configure Attributes & Claims
- In the Attributes & Claims section, click Edit
- Configure the following claims:
Required Claims
| Claim Name | Source Attribute | Namespace |
|---|---|---|
email | user.mail or user.userprincipalname | (leave empty) |
firstName | user.givenname | (leave empty) |
lastName | user.surname | (leave empty) |
Adding Custom Claims
- Click + Add new claim
- For each claim above:
- Enter the Name (e.g.,
email) - Leave Namespace empty
- Select Source as "Attribute"
- Choose the appropriate Source attribute
- Click Save
- Enter the Name (e.g.,
Optional: Group Claims (for Role Mapping)
To enable group-based role assignment:
- Click + Add a group claim
- Select Security groups or Groups assigned to the application
- Under Source attribute, select Group ID or Display Name
- Set the Name to
groups - Click Save
For large organizations, we recommend using "Groups assigned to the application" to limit the groups sent in the token.
Step 4: Download IdP Metadata
- In the SAML Certificates section, locate App Federation Metadata Url
- Copy this URL - you'll need it when configuring Propper
Alternatively, download the certificate directly:
- Under SAML Certificates, find Certificate (Base64)
- Click Download to save the certificate file
- Also copy the following from the Set up [App Name] section:
- Login URL (this is your SSO URL)
- Azure AD Identifier (this is your IdP Entity ID)
Step 5: Assign Users and Groups
- Go to Users and groups in the left menu
- Click + Add user/group
- Select the users or groups who should have access to Propper
- Click Assign
Users will not be able to sign in via SSO until they are assigned to the application.
Step 6: Configure Propper
- Log in to Propper as an organization admin
- Go to Settings > Security > SSO
- Click Configure SSO or Edit Configuration
- Select Microsoft Entra ID as the provider
- Choose one of the following methods:
Option A: Import via Metadata URL (Recommended)
- Paste the App Federation Metadata Url from Step 4
- Click Import
- The IdP Entity ID, SSO URL, and Certificate will be populated automatically
Option B: Manual Configuration
Enter the following values from Step 4:
| Propper Field | Entra ID Value |
|---|---|
| IdP Entity ID | Azure AD Identifier |
| SSO URL | Login URL |
| Certificate | Contents of the downloaded Certificate (Base64) file |
- Click Save Configuration
Step 7: Test the Connection
- In Propper SSO settings, click Test Connection
- A new window will open with the IdP login page
- Sign in with a user who is assigned to the application
- If successful, you'll be redirected back to Propper
Test in an incognito/private browser window to ensure you're testing the full authentication flow.
Optional: Enable JIT Provisioning
To automatically create Propper accounts for new SSO users:
- In Propper SSO settings, enable Just-In-Time Provisioning
- Select a Default Role for new users
- Optionally, configure Allowed Domains to restrict which email domains can be provisioned
- If using group claims, configure Role Mappings to assign roles based on Entra ID groups
Optional: Enforce SSO
To require SSO for all users:
- First, verify your email domain in Propper
- Enable SSO Enforcement for the verified domain
- Add admin email addresses to the Bypass List to prevent lockout
Always add at least one admin to the bypass list before enabling enforcement. This ensures you can still access the admin panel if there are SSO issues.
Troubleshooting
Error: Invalid Signature
- Ensure the certificate in Propper matches the certificate in Entra ID
- If the certificate was recently rotated, update it in Propper
- Verify the certificate hasn't expired in the Entra ID SAML Certificates section
Error: User Not Assigned
- The user attempting to log in is not assigned to the Enterprise Application
- Go to Users and groups and add the user
Error: Attribute Missing
- Ensure all required attributes (email, firstName, lastName) are configured
- Check that the source attributes contain values for the test user
- Verify the claim names exactly match:
email,firstName,lastName
Error: Audience Mismatch
- Verify the Identifier (Entity ID) in Entra ID exactly matches
urn:propper:sp:auth - Check for extra spaces or trailing slashes
Error: Reply URL Mismatch
- Verify the Reply URL exactly matches
https://auth.propper.ai/saml/acs - Ensure there are no typos or trailing slashes
Users See "Access Denied"
- The user may not be assigned to the application in Entra ID
- Check if Conditional Access policies are blocking access
- Verify the user's account is active and not blocked