Add Microsoft Entra ID as a SAML connection
Enabling SAML with Microsoft Entra ID (formerly Azure Active Directory) allows your users to sign up and sign in to your Clerk application with their Microsoft account.
This process requires configuration changes in both the Clerk Dashboard, and in your customer's Microsoft Entra ID settings in their Azure account.
Create a Microsoft Entra ID SAML connection in Clerk
- In the Clerk Dashboard, navigate to the SSO connections page.
- Select Add connection and select For specific domains or organizations.
- Under SAML, select Microsoft Entra ID (Formerly AD).
- Enter the Domain. This is the email domain of the users you want to allow to sign in to your application. Optionally, select an Organization.
- Enter the Name. This will be displayed on the sign-in form.
- Select Add connection. You'll be redirected to the connection's configuration page. Note that the connection is disabled by default.
- In the Service Provider Configuration section, save the Reply URL (Assertion Consumer Service URL) and Identifier (Entity ID) values somewhere secure. You'll need to give these to the customer so they can configure their Microsoft Entra ID application.
Configure SAML application
Now that the enterprise connection is configured in Clerk and the Reply URL and Identifier are known, the customer's Microsoft application needs to be configured. At a high level, the process is:
- Create a new enterprise app in Microsoft Azure.
- Assign selected users or groups to that Microsoft application.
- Add the Reply URL and Identifier from Clerk to the Microsoft application's SAML configuration.
- Verify that the attribute mappings are correct.
- Obtain and share the application's metadata URL.
You are welcome the use the below email template with detailed instructions. They contain the following template strings that you should replace with your actual values:
- [YOUR_APPLICATION_NAME]
- [YOUR_CLERK_ENTITY_ID]
- [YOUR_CLERK_REPLY_URL]
Add App Federation Metadata URL in the Clerk Dashboard
After following the instructions in the email, your customer should have sent you the Microsoft app's App Federation Metadata URL. Now, you're going to add it to the Clerk connection, completing the SAML connection configuration.
- Navigate to the SSO connections page in the Clerk Dashboard.
- Select the SAML connection.
- In the Identity Provider Configuration section, under App Federation Metadata Url, paste the App Federation Metadata URL.
- Select Fetch & save. Keep the page open for the next step.
Enable the connection in Clerk
The SAML connection is ready to enable! Once enabled, all users with email addresses ending in the domain will be redirected to Microsoft at sign-up and sign-in.
To make the connection available for users to authenticate with:
- Navigate back to the Clerk Dashboard where you should still have the connection's configuration page open. If not, navigate to the SSO connections page and select the connection.
- At the top of the page, toggle on Enable connection and select Save.
Feedback
Last updated on