Configure Microsoft Entra (Azure AD) SSO with Engagedly
Table of contents
- Introduction
- Configure SAML SSO in Engagedly
- Create the application in Microsoft Entra
- Configure basic SAML settings
- Configure IdP details in Engagedly
- Assign users
1. Introduction
Microsoft Entra (formerly Azure Active Directory) is a secure identity and access management solution that helps organizations manage user authentication and access across applications. Admins can integrate Microsoft Entra with Engagedly to enable single sign-on (SSO), allowing users to sign in to Engagedly using their organizational credentials.
This integration helps admins enable single sign-on (SSO), centralize authentication, improve security, reduce password-related issues, and simplify user management.
📒Note: Admins and users with integration permissions are authorized to configure this integration.
For more information about SSO integrations, refer to the Overview of integrations.
📒Note: This document covers the integration setup for both Tangerine (V2) and Indigo (V3). Screenshots are captured from Indigo (V3), so the user interface may vary slightly in Tangerine.
2. Configure SAML SSO in Engagedly
Navigate to Settings > Integrations.
- In the "SSO" field, click SAML Single Sign On.
- Click ADD at the top right.
- Enter an identifier name as required and click SAVE.
%20SSO%20with%20Engagedly1.jpg?width=670&height=304&name=Configure%20Microsoft%20Entra%20(Azure%20AD)%20SSO%20with%20Engagedly1.jpg)
Engagedly generates the ACS URL and Entity ID.
3. Create the application in Microsoft Entra
- Log in to the Microsoft Entra Admin Center.
- In the left panel, select Enterprise apps.
- Click + New application to add your application.
%20SSO%20with%20Engagedly2.jpg?width=670&height=304&name=Configure%20Microsoft%20Entra%20(Azure%20AD)%20SSO%20with%20Engagedly2.jpg)
4. In the ”Browse Microsoft Entra Gallery” window, click Create your own application.
5. Enter an application name.
6. Keep Integrate any other application you don't find in the gallery (Non-gallery) selected, and click Create.
%20SSO%20with%20Engagedly3.jpg?width=670&height=304&name=Configure%20Microsoft%20Entra%20(Azure%20AD)%20SSO%20with%20Engagedly3.jpg)
7. In the application overview, select Set up single sign on.
%20SSO%20with%20Engagedly4.jpg?width=670&height=318&name=Configure%20Microsoft%20Entra%20(Azure%20AD)%20SSO%20with%20Engagedly4.jpg)
4. Configure basic SAML settings
-
Select SAML.
%20SSO%20with%20Engagedly5.jpg?width=670&height=318&name=Configure%20Microsoft%20Entra%20(Azure%20AD)%20SSO%20with%20Engagedly5.jpg)
2. In "Basic SAML Configuration", click Edit.
%20SSO%20with%20Engagedly6.jpg?width=670&height=318&name=Configure%20Microsoft%20Entra%20(Azure%20AD)%20SSO%20with%20Engagedly6.jpg)
3. Copy the following values from Engagedly and paste them into the corresponding fields in Microsoft Entra:
| Engagedly field | Microsoft Entra field |
| ACS URL | Reply URL (Assertion Consumer Service URL) |
| Entity ID | Identifier (Entity ID) |
4. Click Save to save the configuration.
%20SSO%20with%20Engagedly7.jpg?width=670&height=318&name=Configure%20Microsoft%20Entra%20(Azure%20AD)%20SSO%20with%20Engagedly7.jpg)
Single sign-on configuration saved successfully.
5. Configure IdP details in Engagedly
- Scroll down to the “Set up” section in Microsoft Entra.
- Copy the following values from Microsoft Entra and paste them into the corresponding fields in Engagedly.
| Microsoft Entra field | Engagedly field |
|
Login URL |
Identity Provider Single Sign-On URL |
| Microsoft Entra Identifier | Identity Provider Issuer |
| Certificate (SAML Certificate: entire content) | Identity Provider X.509 Certificate |
%20SSO%20with%20Engagedly8.jpg?width=670&height=318&name=Configure%20Microsoft%20Entra%20(Azure%20AD)%20SSO%20with%20Engagedly8.jpg)
3. In Microsoft Entra, scroll to the ”SAML Certificates” section and click Download to download the certificate.
%20SSO%20with%20Engagedly9.jpg?width=670&height=318&name=Configure%20Microsoft%20Entra%20(Azure%20AD)%20SSO%20with%20Engagedly9.jpg)
4. Open the downloaded certificate in a text editor, copy the entire content, including the ----- BEGIN CERTIFICATE-----and----- END CERTIFICATE----- lines.

5. Paste the certificate content into the “Identity Provider X.509 Certificate” field in Engagedly.
6. (Optional) Click Test Connection to verify the setup.
7. Use the toggle to activate authentication using SAML and click SAVE.
%20SSO%20with%20Engagedly10.jpg?width=670&height=304&name=Configure%20Microsoft%20Entra%20(Azure%20AD)%20SSO%20with%20Engagedly10.jpg)
You have successfully configured Microsoft Entra SSO with Engagedly.
6. Assign users
- In the Microsoft Entra Admin Portal, select Users from the left panel.
- Click + New User.
- Select Create new user or Invite external user as required.
%20SSO%20with%20Engagedly11.jpg?width=670&height=318&name=Configure%20Microsoft%20Entra%20(Azure%20AD)%20SSO%20with%20Engagedly11.jpg)
4. Follow the prompts to complete the process.
You can also add groups if required.
📒Note: Users must already exist in Engagedly with the same email address to log in using SSO.