Skip to content

Commit b2f6112

Browse files
committed
docs: instructions for entra sso
1 parent 35c999e commit b2f6112

File tree

1 file changed

+39
-1
lines changed

1 file changed

+39
-1
lines changed

advanced/dashboard/sso.mdx

Lines changed: 39 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,4 +91,42 @@ Use single sign-on to your dashboard via SAML and OIDC. If you use Okta or Googl
9191
</Steps>
9292
</Tab>
9393

94-
</Tabs>
94+
<<<<<<< Updated upstream
95+
</Tabs>
96+
||||||| Stash base
97+
</Tabs>
98+
=======
99+
</Tabs>
100+
101+
## Microsoft Entra
102+
103+
<Tabs>
104+
<Tab title="SAML">
105+
<Steps>
106+
<Step title="Create an application">
107+
Under `Enterprise applications`, click to create a new application. Select "Create your own application" and choose "Integrate any other application you don't find in the gallery (Non-gallery)".
108+
</Step>
109+
<Step title="Configure SAML">
110+
Navigate to the Single Sign-On setup page and select SAML. Under Basic SAML Configuration, enter the following:
111+
* Identifier (Entity ID): The Audience URI provided by Mintlify
112+
* Reply URL (Assertion Consumer Service URL): The ACS URL provided by Mintlify
113+
114+
</Step>
115+
<Step title="Configure Attributes & Claims">
116+
Edit the Attributes & Claims section:
117+
* Click on the Unique User Identifier (Name ID) under Required Claim
118+
* Change the Source attribute to use `user.primaryauthoritativeemail`
119+
* Under Additional claims, create the following claims:
120+
| Name | Value |
121+
| ---- | ----- |
122+
| `firstName` | `user.givenname` |
123+
| `lastName` | `user.surname` |
124+
</Step>
125+
<Step title="Send us your IdP information">
126+
Once the application is set up, navigate to the SAML Certificates section and send us the App Federation Metadata URL.
127+
We'll enable the connection from our side using this information.
128+
</Step>
129+
</Steps>
130+
</Tab>
131+
</Tabs>
132+
>>>>>>> Stashed changes

0 commit comments

Comments
 (0)