Setting Up Microsoft Entra (Azure AD)
This document outlines the steps required to set up Microsoft Entra (formerly Azure AD) SSO integration with StepSecurity.
Setup Instructions
Step 1: Create a New Enterprise Application
Navigate to your Microsoft Entra Admin Portal.
Create a new Enterprise Application.
Name the application StepSecurity.

Step 2: Configure Single Sign-On
After creating the application, go to the Single Sign-On section.
Select SAML as the SSO method.

Step 3: Provide SAML Configuration
On the StepSecurity App navigate to Admin Console → Security & Auth → Configure SSO → Micorosoft Entra ID
Copy the values displayed there and provide them in the corresponding fields

Step 4: Add a Group Claim
Update Attributes & Claims to pass group information in the SAML assertion.
Open Attributes & Claims → Add a group claim.
Under Which groups select Groups assigned to the application.
Set Source attribute to Cloud‑only group display names.
Expand Advanced options.
(Optional) You may filter groups if you need to limit which ones are emitted.
Enable Customize the name of the group claim and set Name to
Groups.Click Save
You should only pass specific groups to the StepSecurity platform. If the app passes all group memberships, it may exceed the maximum request body size.
This enables StepSecurity’s SCIM-like functionality — for example, you can use Microsoft Entra groups and map them to roles in the StepSecurity dashboard for centralized access control.

Step 5: Exchange metadata and (optionally) configure IdP‑initiated access
Download the IdP metadata file from the Entra SAML page and share it on the StepSecurity App.

(Optional) For IdP‑initiated login to the StepSecurity Console:
To get your RelayState value go to the StepSecurity App and navigate to Admin Console → Security & Auth → Configure SSO → Microsoft Entra ID → Step 4

In the Entra portal, paste that value into Relay State (Optional) under Basic SAML Configuration and Save.

Last updated
Was this helpful?