Configuring SSO with Microsoft Entra ID
This article walks through setting up Microsoft Entra ID (formerly Azure AD) as the Identity Provider (IdP) for The Mortgage Office (TMO).
SSO IS AN ENTERPRISE ONLY FEATURE
Step 1: Create a SAML Application in Entra ID
- Sign in to https://entra.microsoft.com.
- In the left navigation pane, scroll to Applications.
- Click Enterprise Applications → + New Application.
- Click + Create your own application.
- Enter a name for the application (e.g., "TMO").
- Select Integrate any other application you don't find in the gallery.
- Click Create. It may take a moment for the application to be provisioned.
- Once created, click Get Started under the "Set up single sign on" card.
- Select SAML as the sign-on method.
- Click Edit on the Basic SAML Configuration card and enter the following:
| Field | Action | Value |
|---|---|---|
| Identifier (Entity ID) | Click "Add Identifier" | https://app.themortgageoffice.com/ |
| Reply URL (ACS URL) | Click "Add reply URL" | https://app.themortgageoffice.com/Saml2/Acs |
| Logout URL (optional) | Enter directly | https://app.themortgageoffice.com/Saml2/Logout |
11. Click Save.
12. Verify that the default Attributes and Claims in card 2 are correct. By default, Entra ID includes the necessary claims — no changes are usually needed.
Step 2: Gather the Entra ID Metadata
Note down the following two values from the SAML configuration screen:
- Scroll to card 3 — SAML Certificates — and copy the App Federation Metadata URL. This is your IdP Metadata URL.
- Scroll to card 4 — Set up TMO — and copy the Microsoft Entra Identifier. This is your IdP Entity ID.
You will need both of these when configuring TMO.
Step 3: Assign Users in Entra ID
- In the TMO enterprise application, go to Users and Groups.
- Click Add user/group.
- Click None selected, then choose the users you want to assign to TMO.
- Click Select, then Assign.
- Note down the email address for each assigned user — these must match the emails configured in TMO.
Step 4: Complete the TMO-Side Configuration
Now that Entra ID is set up, configure TMO with your IdP details and ensure users exist in TMO. Follow the steps in Setting Up SSO in TMO (All Identity Providers).
You will need the IdP Entity ID (Microsoft Entra Identifier) and Metadata URL (App Federation Metadata URL) gathered in Step 2.
Advanced Configuration
The following optional settings can be adjusted within Entra ID after initial setup:
Assignment Required
By default, users must be explicitly assigned to the TMO application in Entra ID. If you want to allow all users in your directory to access TMO without individual assignment:
- In the TMO application, navigate to Properties.
- Set Assignment Required to No.
Customizing NameID Format
- In the TMO application, navigate to Single sign on.
- Scroll to Attributes and Claims and click Edit.
- Click Unique User Identifier (Name ID).
- Select the desired Name identifier format from the dropdown.
Adding or Removing Claims
From the same Attributes and Claims editor, you can add custom claims or remove existing ones as needed for your configuration.
Entra ID-Specific Behaviors
Name ID Format: Entra ID supports the "Transient" format but does not expose it in the configuration dropdown. It will honor the Name ID format requested by the SP (TMO).
Assertion Encryption: Disabled by default.
Troubleshooting
If you encounter errors during setup or sign-in, see SSO Troubleshooting & Error Reference.