docs-mintlify/admin/sso/microsoft-entra-id/saml.mdx
With SAML (Security Assertion Markup Language) enabled, you can authenticate users in Cube through Microsoft Entra ID (formerly Azure Active Directory), allowing your team to access Cube using single sign-on.
<Note>Available on Enterprise plan.
</Note>Before proceeding, ensure you have the following:
First, enable SAML authentication in Cube:
Before returning to Cube, configure the SAML claims Entra sends during login. Cube uses these claims to identify the user and map optional attributes such as display name.
Create explicit SAML claims in Entra with the names Cube uses by default.
email and Source attribute to
user.userprincipalname or user.mail.name and Source attribute to
user.displayname.If you plan to map Cube roles based on Entra group membership (see Map roles by group below), also add a group claim:
Still in Attributes & Claims, click Add a group claim.
Choose which groups to include (e.g. Security groups or Groups assigned to the application) and pick a Source attribute for the group name. For most setups, select sAMAccountName or Cloud-only group display names so the assertion carries human-readable group names that match the IdP group name values you'll configure in Cube Cloud.
Save the claim.
Cube reads Entra's canonical groups claim URL
(http://schemas.microsoft.com/ws/2008/06/identity/claims/groups)
automatically, so no further attribute renaming is required on the
Entra side.
Return to the SAML configuration page in Cube and provide the identity provider details. You can do this in one of two ways:
Option A: Upload metadata file
Option B: Enter details manually
If you prefer to configure the fields manually, enter the following values from the Entra Single sign-on page:
In both options, also configure the following setting:
Auto-provisioned users — both via SAML and via SCIM — receive the Viewer role by default. To assign a different role, expand the Advanced section of the SAML configuration form and pick from Default role for new users:
The selected role applies only when a user is first created during
provisioning. Existing users are not modified on subsequent SSO logins or
SCIM updates. It is applied in addition to any roles your identity
provider sends via the role attribute
(subject to the rolesMap).
Admin status is not assignable through this picker — Admin is controlled separately. To grant admin permissions, update the user's role manually under Admin → Users.
</Info> <Warning>If the selected role is later renamed or deleted, new users will fall back to the Viewer role until you pick a valid role here. The Viewer fallback applies whenever the configured default cannot be resolved — whether that's because no default is set or the configured role no longer exists.
</Warning> <Info>Admin status cannot be set via SSO. To grant admin permissions, update the user's role manually in Cube under Team & Security.
</Info>For finer-grained role assignment, enable Map roles by group in the Advanced Settings section to assign Cube roles based on a user's Entra group memberships.
To configure group-based role mapping:
groups. Cube also reads Entra's canonical
groups claim URL automatically, so the default usually works
out of the box.How it's applied:
The same groupsRolesMap is also consumed by SCIM when
groups are pushed and members are added, so a single configuration drives
both SAML SSO and SCIM group sync.
The legacy rolesMap setting (a translation from raw IdP role values to
Cube role names, applied to the Role attribute) continues to work
and is applied in addition to groupsRolesMap. They read different
SAML attributes (role vs. groups) and can be used side by side —
typical setups using Entra App Roles for the role attribute and Entra
security groups for the group attribute.
Make sure the new Enterprise Application is assigned to the relevant users or groups in Entra before testing.