Microsoft Entra ID (Azure AD) SSO Setup Guide
This guide walks you through configuring Microsoft Entra ID (formerly Azure Active Directory) as your Identity Provider (IdP) for CRA Evidence single sign-on.
Prerequisites
- Microsoft Entra ID administrator access (Global Administrator or Application Administrator)
- CRA Evidence organisation admin access
- Your company email domain (e.g.,
company.com)
Step 1: Get CRA Evidence SP Information
Before configuring Entra ID, gather the Service Provider (SP) information from CRA Evidence:
- Log in to CRA Evidence as an organisation admin
- Go to Settings > Single Sign-On
- Note the following values:
- Entity ID (Identifier):
https://app.craevidence.com - Reply URL (ACS):
https://app.craevidence.com/api/v1/saml/acs
- Entity ID (Identifier):
Step 2: Create Enterprise Application
- Sign in to the Microsoft Entra admin center (https://entra.microsoft.com)
- Navigate to Identity > Applications > Enterprise applications
- Click + New application
- Click + Create your own application
- Enter:
- Name:
CRA Evidence - Select: Integrate any other application you don't find in the gallery (Non-gallery)
- Name:
- Click Create
Step 3: Configure SAML SSO
- In your new CRA Evidence application, go to Single sign-on
- Select SAML
Basic SAML Configuration
Click Edit on the Basic SAML Configuration section:
| Field | Value |
|---|---|
| Identifier (Entity ID) | https://app.craevidence.com |
| Reply URL (ACS URL) | https://app.craevidence.com/api/v1/saml/acs |
| Sign on URL | https://app.craevidence.com/login |
| Relay State | (leave blank) |
| Logout URL | https://app.craevidence.com/api/v1/saml/sls |
Click Save
Attributes & Claims
Click Edit on the Attributes & Claims section:
Required claim (already configured):
| Claim name | Value |
|---|---|
| Unique User Identifier (Name ID) | user.userprincipalname or user.mail |
Add additional claims:
Click + Add new claim for each:
| Name | Source | Source attribute |
|---|---|---|
email |
Attribute | user.mail |
firstName |
Attribute | user.givenname |
lastName |
Attribute | user.surname |
displayName |
Attribute | user.displayname |
Click Save
SAML Certificates
- In the SAML Certificates section, find Certificate (Base64)
- Click Download to download the certificate
- Note the App Federation Metadata Url (optional, for metadata import)
Set up CRA Evidence
From the Set up CRA Evidence section, copy:
| Field | Description |
|---|---|
| Login URL | This is your IdP SSO URL |
| Azure AD Identifier | This is your IdP Entity ID |
| Logout URL | This is your IdP SLO URL |
Step 4: Configure CRA Evidence
- In CRA Evidence, go to Settings > Single Sign-On
- Click Add Identity Provider
- Fill in the form:
| Field | Value |
|---|---|
| Name | Microsoft Entra ID (or your preferred name) |
| Vendor | Microsoft Entra ID (Azure AD) |
| Entity ID | The "Azure AD Identifier" from Entra |
| SSO URL | The "Login URL" from Entra |
| SLO URL | The "Logout URL" from Entra |
| X.509 Certificate | Open the downloaded certificate and paste contents |
Provisioning Settings:
| Field | Recommended Value |
|---|---|
| JIT Provisioning | Enabled |
| Default Role | Member |
| Update on Login | Enabled |
- Click Add Identity Provider
Step 5: Add SSO Domain
- In CRA Evidence SSO settings, go to Domains
- Click Add Domain
- Enter your email domain (e.g.,
company.com) - Select the Entra ID IdP you just created
- Click Add Domain
Verify Domain Ownership
- Add a DNS TXT record:
- Host:
_craevidence-verification - Value: (the token shown in CRA Evidence)
- Host:
- Wait for DNS propagation (up to 48 hours)
- Click Verify Now in CRA Evidence
Step 6: Assign Users in Entra ID
- In Entra admin center, go to your CRA Evidence application
- Go to Users and groups
- Click + Add user/group
- Select users or groups who should have access
- Click Assign
Note: By default, user assignment is required. If you want all users to access without assignment:
- Go to Properties
- Set Assignment required? to No
Step 7: Test SSO
- Open a new incognito/private browser window
- Go to
https://app.craevidence.com/login - Enter an email address from your SSO domain
- You should be redirected to Microsoft login
- Authenticate with your Microsoft credentials
- You should be redirected back to CRA Evidence, logged in
Optional: Enable SSO Enforcement
Once testing is successful, you can require SSO for all users:
- Go to Settings > Single Sign-On > Enforcement
- Enable Require SSO for all users
- Optionally enable Allow admins to bypass SSO
- Click Save Settings
Troubleshooting
"AADSTS50011" - Reply URL Mismatch
- Verify the Reply URL in Entra exactly matches:
https://app.craevidence.com/api/v1/saml/acs - Check for trailing slashes or http vs https
"AADSTS700016" - Application Not Found
- Ensure the Identifier (Entity ID) matches exactly
- Verify the application is properly configured in Entra
User Not Being Created
- Confirm JIT Provisioning is enabled in CRA Evidence
- Verify the user has the
emailclaim populated - Check that the user is assigned to the application in Entra
Certificate Errors
- Download a fresh certificate from Entra
- Ensure you're using the Base64 format
- Include the
-----BEGIN CERTIFICATE-----and-----END CERTIFICATE-----lines
"User not assigned to application"
- Go to Users and groups in the Entra application
- Assign the user or their group
- Or set Assignment required? to No in Properties
Advanced Configuration
Conditional Access
You can use Entra Conditional Access policies to:
- Require MFA for CRA Evidence access
- Restrict access by location or device
- Block risky sign-ins
Group Claims
To send group information (for future role mapping):
- In Attributes & Claims, click + Add a group claim
- Select groups to include
- Configure the claim name
Token Encryption (Optional)
For additional security:
- Generate an encryption certificate
- Upload to CRA Evidence SP configuration
- Enable encrypted assertions in CRA Evidence IdP settings
Security Recommendations
- Enable Conditional Access for additional security
- Use Security Groups to control access
- Monitor Sign-in Logs in Entra for suspicious activity
- Set Token Lifetime policies appropriately
- Enable MFA through Conditional Access
Support
If you encounter issues:
- Check the SAML SSO Architecture documentation
- Review Entra sign-in logs for detailed error messages
- Contact CRA Evidence support at support@craevidence.com
- Provide:
- Error message (including Entra error codes like AADSTS...)
- Screenshot of Entra application configuration
- CRA Evidence IdP configuration (without certificate)
Help us improve. What was missing or unclear?