Visit https://entra.microsoft.com and login as an Administrator. Once logged in, select Enterprise apps in the left nav:
On the Enterprise applications page, click the New application button:
You will be taken to the Browse Microsoft Entra Gallery page. Click the Create your own application button:
Enter ExecOnline for the name of your application and select the Integrate any other application you don’t find in the gallery (Non-gallery) option:
You will then be taken the ExecOnline | Overview page. Click on the Single sign-on option in the left nav:
You will be shown some options for SSO, select SAML:
On the SAML-based Sign-on page, click on the Edit button for the Basic SAML Configuration section:
A new drawer will slide out from the right, click on the Add identifier and Add reply URL links:
This will give you fields into which you can enter the following:
Field Name | Value |
Identifier( Entity ID) |
|
Reply URL | |
Relay State | Provided by your ExecOnline rep |
You will need to come back and update the Relay State to replace IDENTITY_PROVIDER_NAME_HERE once you have created the IdP configuration in Cognito
You will be returned to the SAML-based Sign-on page. Click on the Edit link in the Attributes & Claims section:
Double click on the Unique User Identifier (Name ID) claim:
Click on the Source attribute and select user.employeeid from the dropdown:
Expand the Choose name identifier format and click on Email address and select Persistent from the drop down list:
Verify that the fields are correct and click the Save button:
You will be returned to the Attributes & Claims page. Click on the Add new claim button:
Enter the following details and then click the Save button:
Field Name | Value |
Name |
|
Source attribute |
|
The Attributes & Claims overview should now look like this:
Return to the SAML-based Sign-on page where you can now copy the the metadata URL to complete the Cognito setup:

















