Set Up SSO with Entra ID

This guide covers the complete SSO setup between Enpass Admin Console and Microsoft Entra ID (formerly Azure Active Directory). Follow each phase in order — you'll move between both portals during the process.

You'll need:

Phase 1: Start the SSO Connector in Enpass

  1. Log in to the Enpass Admin Console.

  2. Navigate to Settings > Single Sign-On.

  3. Click Set Up to open the SAML Configuration dialog.

  4. Enter a name for your configuration (e.g., Entra ID SSO), select Microsoft Entra ID as the Identity Provider, and click Continue.

  5. On the next screen, you'll see your SP Entity ID and SP Assertion Consumer Service (ACS) URL. Keep this page open — you'll need these values in Phase 2.

Phase 2: Configure the SAML App in Microsoft Entra ID

Step 1: Create an Enterprise Application

  1. In the Entra ID Portal, select Enterprise Applications from the sidebar.

  2. Click New Application > Create your own application.

  3. Enter a name for the app (e.g., Enpass Admin Console SSO).

  4. Select Integrate any other application you don't find in the gallery (Non-gallery) and click Create.

  5. In the sidebar of the new app, select Single sign-on.

  6. Choose SAML as the sign-on method.

Step 2: Enter Enpass SP Details

  1. Under Basic SAML Configuration, click Edit.

  2. Enter the Identifier (Entity ID) and Reply URL (ACS URL) copied from the Enpass Admin Console in Phase 1.

  3. Click Save, then close the panel.

Step 3: Configure Attributes & Claims

  1. Under Attributes & Claims, click Edit.

  2. In the Additional Claims section, click the claim with the value user.email.

  3. In the Manage claim window:

    • Set the Name field to email.

    • Clear the Namespace field entirely.

    • Click Save.

  4. Close the panel. You may safely delete any claims other than email.

Step 4: Configure Certificate Signing

  1. Click Edit next to Token signing certificate.

  2. Set the Signing Option to Sign SAML response and assertion.

  3. Click Save, then close the panel.

Step 5: Copy the Metadata URL

  1. In the SAML Certificates section, copy the App Federation Metadata URL. You'll use this in Phase 3.

Step 6: Assign Users

  1. In the sidebar under Manage, select Users and Groups.

  2. Assign all admins who need SSO access to the Enpass Admin Console to this application.

Phase 3: Finish Setup in Enpass

  1. Return to the Enpass Admin Console SSO setup page (where you left off in Phase 1).

  2. Paste the App Federation Metadata URL copied from Entra ID into the Metadata URL field, or upload the metadata XML file if preferred.

  3. Click Add Configuration to save.

Test the Configuration

  1. Click Test Configuration, then click Start Test. A new tab will open and run a test sign-in through Entra ID. The tab closes automatically when the test is complete.

If the test fails, double-check that the Entity ID and ACS URL in Entra ID exactly match the values from Enpass, and that the metadata URL is accessible.

Activate SSO

  1. Once the test passes, click Activate to enable SSO login for Admin Console users.

Enforce SSO (Optional)

  1. To make SSO the only permitted login method, enable the Enforce SSO toggle on the SSO settings page. This disables email/password login for all admins.