Skip to main content

Microsoft Entra SSO

Set up SSO with Microsoft Entra and ExecOnline.

Written by Richard Virginia
Updated this week

Visit https://entra.microsoft.com and login as an Administrator. Once logged in, select Enterprise apps in the left nav:

On the Enterprise applications page, click the New application button:

You will be taken to the Browse Microsoft Entra Gallery page. Click the Create your own application button:

Enter ExecOnline for the name of your application and select the Integrate any other application you don’t find in the gallery (Non-gallery) option:

You will then be taken the ExecOnline | Overview page. Click on the Single sign-on option in the left nav:

You will be shown some options for SSO, select SAML:

On the SAML-based Sign-on page, click on the Edit button for the Basic SAML Configuration section:

A new drawer will slide out from the right, click on the Add identifier and Add reply URL links:

This will give you fields into which you can enter the following:

Field Name

Value

Identifier( Entity ID)

urn:amazon:cognito:sp:us-west-2_spKBBJEZI

Reply URL

Relay State

Provided by your ExecOnline rep

You will need to come back and update the Relay State to replace IDENTITY_PROVIDER_NAME_HERE once you have created the IdP configuration in Cognito

You will be returned to the SAML-based Sign-on page. Click on the Edit link in the Attributes & Claims section:

Double click on the Unique User Identifier (Name ID) claim:

Click on the Source attribute and select user.employeeid from the dropdown:

Expand the Choose name identifier format and click on Email address and select Persistent from the drop down list:

Verify that the fields are correct and click the Save button:

You will be returned to the Attributes & Claims page. Click on the Add new claim button:

Enter the following details and then click the Save button:

Field Name

Value

Name

employeeIdentifier

Source attribute

user.employeeid

The Attributes & Claims overview should now look like this:

Return to the SAML-based Sign-on page where you can now copy the the metadata URL to complete the Cognito setup:

Did this answer your question?