Developer Docs - Trust Swiftly
  • Developer Documentation
  • Web
    • Integration
    • Button Link
    • WordPress
    • WebView iOS and Android
    • Bubble ID Verify Integration
    • FlutterFlow Identity Verification
    • Webflow ID Verification
    • Zapier Identity Verification
  • API
    • Getting an API Key
    • Authentication
    • Users
    • Reverify User
    • Documents
    • Stats
    • Templates
    • Errors
    • Pagination
    • Filtering and Sorting
    • Rate Limits
  • Webhooks
    • Setup and Handling Webhooks
    • Webhook Code Examples
  • Hosted Link
    • Share hosted link
  • Self Sign Up and Create Autofill
    • Configure self verifications
    • Prefill User Creation
  • Single Sign On
    • SAML2 SSO (Okta, etc)
    • Rippling SSO App
    • Azure Entra ID SAML
  • Notifications
    • Slack
    • Zoho Cliq
    • Email and Web Push
  • Stripe App
    • Install and Demo Guide
    • Disconnect Stripe App
  • References
    • Supported Documents
  • Links
    • Trustswiftly.com
    • Sign Up
Powered by GitBook
On this page
  1. Single Sign On

Azure Entra ID SAML

For added security Trust Swiftly is compatible with Azure SSO which allows your admins to not reenter their password to access the app. Setup SSO with Entra using a custom app for SAML authentication.

PreviousRippling SSO AppNextSlack

Last updated 5 months ago

  1. Add a Custom Enterprise App -

  2. Go to + New Application > Create your Own application from the top navigation menu.

  3. Click Integrate any other application you don't find in the gallery (Non-gallery) radio to create a new application.

    From the next screen, fill in the following fields:

    • App Name - Trust Swiftly

    • Upload Logo - You can download and use as an icon or download the below. Go to Properties of the app then you can modify the logo.

  4. In the Manage section of the app select Single sign-on then click the SAML box.

  5. Click Edit next to the Basic SAML Configuration. Then copy and paste the below into their respective inputs. Click Save to complete. Replace [COMPANY] with your actual name.

https://[COMPANY].trustswiftly.com/auth/saml2
https://[COMPANY].trustswiftly.com/auth/saml2/callback
https://[COMPANY].trustswiftly.com/auth/saml2/login
  1. In the Attributes & Claims section click Edit. On this popup edit the Unique User Identifier (Name ID) so the identifier format is set to Email address.

  1. Next update the Claim name: name by clicking the edit icon and changing the value to user.displayname

  1. In the SAML Certificates section copy the App Federation Metadata Url and paste it in your Trust Swiftly Auth settings page https://[COMPANY].trustswiftly.com/settings/auth and save it for the Single Sign On input.

  1. After this is completed and tested you can enable the Force SAML setting for added security. Only SAML authenticated sessions will be allowed.

https://entra.microsoft.com/#view/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/~/AppAppsPreview
https://app.trustswiftly.com/assets/images/icon.png