Microsoft Entra ID (Active Directory) Integration

Prev Next

The Microsoft Entra ID (formerly Active Directory) integration will allow you to authenticate the users of your Progressive Web App or Approvals solution against your own existing Entra ID user pool. CivicPlus's Entra ID integration uses SAML 2.0.

Important Note

Configure Entra ID App

  1. To use the integration, you must have an Entra ID App configured. In the example below, we are using the Enterprise application and choosing the Integrate any other application you don't find in the gallery (Non-gallery) option. User interface for creating a new application in Azure AD Gallery.


Progressive Web App Instructions

  1. Sign in to your site

  2. Navigate to Apps and click Manage on your app Manage button on the application card.

  3. Navigate to the Developer Tools tab Navigation menu highlighting the Developer Tools section among other options.

  4. Click the Configure SAML button under Integrate with a SAML SSO Provider

  5. Follow the SAML Configuration and Instructions Instructions for configuring SAML with Microsoft Entra ID and Auth0 for Single Sign-On.

    • Entra ID Setup

      1. Create a Single Sign-On application in your Entra ID

      2. Copy the Identifier (Entity ID) into your application configuration

      3. Copy the Reply URL (Assertion Consumer Service URL) into your application configuration

      4. Copy the App Federation Metadata URL from your Single Sign-On application SAML configuration settings including Identifier and Reply URL for single sign-on setup.

    • App Federation Metadata Url: Enter the URL you copied from your application

    • Mapping Additional User Details: The listed claims can be added to your Single Sign-On application which will be included in the submission data

  6. Click Save

    Note:

    After clicking the Save button, users will be redirected straight to your Entra ID login screen when clicking the Login button in this app.


Approvals Instructions

  1. Sign in to your site

  2. Navigate to the Approvals tab The Approvals option in the navigation menu.

  3. Select the Approvers tab The image shows a navigation menu with the 'Approvers' tab highlighted.

  4. Enable the Integrate with a SAML SSO Provider toggle

  5. Click Edit Groups to configure the groups assigned to your SAML users

    Note:

    Your existing groups will not carry over as SAML groups. These will need to be reconfigured if you have existing flows using the same group name.

  6. Click Add GroupThe Add Group button.

  7. Add a Group name and enter the Notification email addresses for the group Form for creating groups with fields for group name and notification email addresses.

    Note:

    To ensure your users have access to the correct approvals, you will need to map the configured group name to your SAML user claims.

  8. Click SaveThe Save button on the add groups screen.

  9. Follow the SAML Configuration and Instructions for your Entra ID/Active Directory integration

    • Entra ID Setup

      1. Create a Single Sign-On application in your Entra ID

      2. Copy the Identifier (Entity ID) into your application configuration

      3. Copy the Reply URL (Assertion Consumer Service URL) into your application configuration

      4. Copy the App Federation Metadata URL from your Single Sign-On application SAML configuration settings including Identifier and Reply URL for single sign-on setup.

      5. App Federation Metadata Url: Enter the URL you copied from your application

      6. Mapping Additional User Details: The listed claims can be added to your Single Sign-On application, which will be included in the submission data

        Note:

        To ensure your users have access to the correct approvals, you will need to map the configured group name to your SAML user claims.

  10. Click Save