Configuring SAML SSO with Microsoft Entra
This guide explains how to configure SAML SSO for Specmatic Insights using Microsoft Entra as the Identity Provider (IdP).
Prerequisites
- Administrative access to Microsoft Entra
- Administrative access to your Specmatic Insights instance
Step 1: Get SAML Configuration Values from Specmatic Insights
- In your Specmatic Insights instance, navigate to the SAML SSO configuration section.
- Copy the following values, which you'll need for the Microsoft Entra configuration:
- Service Provider Entity ID:
https://insights.specmatic.io/saml2/<RANDOM_CHARACTERS> - Assertion Consumer Service URL/SSO Redirect URL:
https://insights.specmatic.io/login/saml2/sso/<RANDOM_CHARACTERS>
- Service Provider Entity ID:
Step 2: Create Enterprise Application in Entra
- Log in to the Microsoft Entra admin center.
- Navigate to Entra ID > Enterprise Apps in the left sidebar.
- Click New Application.
- Select Create your own application.
- Enter the application name (e.g., "Specmatic Insights").
- Select Integrate any other application you don't find in the gallery (Non-gallery).
- Click Create.
Step 3: Configure SAML SSO in Entra
-
In your newly created application, go to Single sign-on.
-
Select SAML as the single sign-on method.
-
In the Basic SAML Configuration section, click Edit.
-
Enter the values you copied from Specmatic Insights in Step 1:
- Identifier (Entity ID):
https://insights.specmatic.io/saml2/<RANDOM_CHARACTERS> - Reply URL (Assertion Consumer Service URL):
https://insights.specmatic.io/login/saml2/sso/<RANDOM_CHARACTERS>
Figure 1: Configuring Basic SAML Settings in Microsoft Entra - Identifier (Entity ID):
-
Click Save.
Step 4: Get Entra configuration details and configure Specmatic Insights
-
From the SAML Certificates section, copy the App Federation Metadata URL.
Figure 2: Copy the App Federation Metadata URL from the SAML Certificates section -
Paste the App Federation Metadata URL from Microsoft Entra into the Metadata URL field in Specmatic Insights SSO configuration.
Figure 3: Paste the App Federation Metadata URL into the Metadata URL field in Specmatic Insights -
From the Set up Specmatic Insights section in Microsoft Entra, copy the Microsoft Entra Identifier.
Figure 4: Copy the Microsoft Entra Identifier from the Set up Specmatic Insights section -
Paste the Microsoft Entra Identifier into the Identity Provider Entity ID field in Specmatic Insights SSO configuration.
Figure 5: Paste the Microsoft Entra Identifier into the Issuer URL field in Specmatic Insights -
Enable SAML SSO and save the configuration.
Step 5: Configure user attributes (Optional)
To ensure proper user information is passed from Entra to Specmatic Insights:
- In your Entra application, go to Single sign-on > Attributes & Claims.
- Verify the default claims are configured:
- Unique User Identifier (Name ID):
user.userprincipalname(this must match the user’s email address in Microsoft Entra).
- Unique User Identifier (Name ID):
Note: These attribute mappings ensure that user information is correctly synchronized between Entra and Specmatic Insights.
Step 6: Assign users to the application
- In your Entra application, navigate to Users and groups.
- Click Add user/group.
- Select the users or groups that should have access to Specmatic Insights.
- Click Assign.
Important: Users must be assigned to the application in Entra before they can access Specmatic Insights via SSO.
Step 7: Test the SAML SSO integration
- Open the Specmatic Insights login page.
- Click Sign in with SSO (or your org’s SSO option).
- Sign in via Microsoft Entra and confirm you are redirected back to Insights successfully.
Troubleshooting
Tip: If you encounter issues during setup or login, check the following common problems:
SAML Configuration Issues
- Invalid Entity ID or Reply URL: Double-check that the values from Specmatic Insights exactly match what's configured in Microsoft Entra.
- Metadata URL not accessible: Ensure the App Federation Metadata URL from Microsoft Entra is publicly accessible and correctly copied.
- Certificate issues: If using custom certificates, verify they are valid and properly configured.
User Access Issues
- User not assigned: Ensure users are assigned to the application in Microsoft Entra (Step 6).
- User attributes missing: Verify that required user attributes (email, name) are being sent in the SAML response.
- User doesn't exist in Specmatic Insights: Some SSO configurations require users to be pre-created in the target application.
Authentication Flow Issues
- Redirect loops: Check that the Reply URL in Microsoft Entra exactly matches the Assertion Consumer Service URL from Specmatic Insights.
- Invalid SAML response: Use browser developer tools to inspect SAML responses for error messages.
- Clock skew: Ensure system clocks are synchronized between Microsoft Entra and Specmatic Insights servers.
Testing and Validation
- Use SAML tracer tools: Browser extensions like SAML-tracer can help debug SAML authentication flows.
- Check Microsoft Entra sign-in logs: Review the sign-in logs in Microsoft Entra admin center for error details.
- Verify Specmatic Insights logs: Check application logs for SAML processing errors.
For additional help with SAML SSO configuration, consult the Specmatic Insights documentation or contact Specmatic support.
Troubleshooting
Tip: If you encounter issues during setup or login, check the following common problems:
SAML Configuration Issues
- Invalid Entity ID or Reply URL: Double-check that the values from Specmatic Insights exactly match what's configured in Microsoft Entra.
- Metadata URL not accessible: Ensure the App Federation Metadata URL from Microsoft Entra is publicly accessible and correctly copied.
- Certificate issues: If using custom certificates, verify they are valid and properly configured.
User Access Issues
- User not assigned: Ensure users are assigned to the application in Microsoft Entra (Step 6).
- User attributes missing: Verify that required user attributes (email, name) are being sent in the SAML response.
- User doesn't exist in Specmatic Insights: Some SSO configurations require users to be pre-created in the target application.
Authentication Flow Issues
- Redirect loops: Check that the Reply URL in Microsoft Entra exactly matches the Assertion Consumer Service URL from Specmatic Insights.
- Invalid SAML response: Use browser developer tools to inspect SAML responses for error messages.
- Clock skew: Ensure system clocks are synchronized between Microsoft Entra and Specmatic Insights servers.
Testing and Validation
- Use SAML tracer tools: Browser extensions like SAML-tracer can help debug SAML authentication flows.
- Check Microsoft Entra sign-in logs: Review the sign-in logs in Microsoft Entra admin center for error details.
- Verify Specmatic Insights logs: Check application logs for SAML processing errors.
For additional help with SAML SSO configuration, consult the Specmatic Insights documentation or contact Specmatic support.