apps/docs/content/guides/integrate/identity-providers/azure-ad-saml.mdx
import GeneralConfigDescription from './_general_config_description.mdx'; import Intro from './_intro.mdx'; import CustomLoginPolicy from './_custom_login_policy.mdx'; import IDPsOverview from './_idps_overview.mdx'; import Activate from './_activate.mdx'; import PrefillAction from './_prefill_action.mdx';
<Intro components={props.components} provider="Entra ID (former Azure Active Directory)"/>You need to have access to an Entra ID Tenant. If you do not yet have one follow this guide from Microsoft to create one for free.
We start setting up the enterprise application.
To allow all users to sign in using ZITADEL we need to manually disable required assignment:
Configure the sign-on method of the app.
Now we configure the identity provider on ZITADEL.
After you created the SAML provider in ZITADEL, you can copy the URLs you need to configure in your Entra ID application.
Go back to ZITADEL and activate the IdP.
By default, ZITADEL shows what you define in the default settings. If you overwrite the default settings for an organization, you need to send the organization scope in your auth request.
Click Microsoft Entra
https://github.com/zitadel/actions/blob/main/examples/entra_id_saml_prefil_register_form.js