# Azure Entra ID SAML

1. Add a Custom Enterprise App - <https://entra.microsoft.com/#view/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/~/AppAppsPreview>

2. Go to **+ New Application** > **Create your Own application** from the top navigation menu.&#x20;

3. Click **Integrate any other application you don't find in the gallery (Non-gallery)** radio to create a new application.

   From the next screen, fill in the following fields:

   * **App Name -** Trust Swiftly
   * **Upload Logo -** You can download <https://app.trustswiftly.com/assets/images/icon.png> and use as an icon or download the below. Go to **Properties** of the app then you can modify the logo.&#x20;

   <figure><img src="https://1722465976-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MQXj2cAjHd66kg8IboI%2Fuploads%2FfJugnjjrNwylBjtSbelS%2Ftrustswiflty-icon.png?alt=media&#x26;token=6ece4970-497a-4233-914d-513e4d92c6b5" alt="" width="188"><figcaption></figcaption></figure>

4. In the **Manage** section of the app select **Single sign-on** then click the **SAML** box.

5. Click **Edit** next to the Basic SAML Configuration. Then copy and paste the below into their respective inputs. Click Save to complete. Replace \[COMPANY] with your actual name.

```html
https://[COMPANY].trustswiftly.com/auth/saml2
https://[COMPANY].trustswiftly.com/auth/saml2/callback
https://[COMPANY].trustswiftly.com/auth/saml2/login
```

<figure><img src="https://1722465976-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MQXj2cAjHd66kg8IboI%2Fuploads%2FlTxbwP5yRGXQFIA5E8BY%2Fimage.png?alt=media&#x26;token=1509549f-2e11-41de-a900-dbac2834da5e" alt=""><figcaption></figcaption></figure>

6. In the **Attributes & Claims** section click Edit. On this popup edit the Unique User Identifier (Name ID) so the identifier format is set to **Email address.**

<figure><img src="https://1722465976-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MQXj2cAjHd66kg8IboI%2Fuploads%2F6goOEdJJf5H7Jq7Dq1Iv%2Fimage.png?alt=media&#x26;token=0e05bfdb-e4b6-4002-8b20-268980a2bff3" alt=""><figcaption></figcaption></figure>

7. Next update the **Claim name:** *name* by clicking the edit icon and changing the value to **user.displayname**

<figure><img src="https://1722465976-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MQXj2cAjHd66kg8IboI%2Fuploads%2F71JWiNruinLA09mP01SF%2Fimage.png?alt=media&#x26;token=1f44a9fe-8cf9-4929-8b7b-478790adddbf" alt=""><figcaption></figcaption></figure>

8. In the SAML Certificates section copy the App Federation Metadata Url and paste it in your Trust Swiftly Auth settings page `https://[COMPANY].trustswiftly.com/settings/auth` and save it for the Single Sign On input.

<figure><img src="https://1722465976-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MQXj2cAjHd66kg8IboI%2Fuploads%2Ftez6TjaSfTGkwFIOSf3u%2Fimage.png?alt=media&#x26;token=d57f4291-d7f8-489f-b743-dcffdb194a5d" alt=""><figcaption></figcaption></figure>

9. After this is completed and tested you can enable the Enforce Single Sign On setting for added security. Only SAML authenticated sessions will be allowed.&#x20;
