Overview
SSO via Microsoft Entra ID using OIDC or SAML, with Conditional Access support and optional SCIM provisioning.
Capabilities
-
OIDC and SAML single sign-on
-
Group/role claim mapping to AccessGuard roles
-
Conditional Access compatibility (device/compliance/geo)
-
Optional SCIM 2.0 user & group provisioning
-
Multi-tenant or single-tenant app registrations
-
JWKS discovery and automatic key rotation
Setup Steps (6)
-
1
Step 1
In Entra admin center, create an App registration; enable ID tokens (OIDC) or configure Enterprise app (SAML).
-
2
-
3
Step 3
In AccessGuard → Settings → SSO, add **Azure AD** and paste the credentials or SAML metadata.
-
4
-
5
-
6
Limitations
-
SCIM requires appropriate Entra licensing and admin consent.
-
Group claims may require directory settings for overage scenarios (large groups).
-
SAML entity IDs and reply URLs must exactly match the configured values.
FAQs
Do you support national cloud tenants?
Yes. Provide the correct authority/issuer URL for your cloud (e.g., Azure Government).
Can we restrict by domain?
Yes. Limit tenants or enforce domain allowlists via AccessGuard policies.
How are roles assigned?
Via group/claim mapping rules evaluated at login and on SCIM updates.
Pricing
Free
Free
Great for trying the integration.
Pro
USD 9.99 / monthly
Enterprise
USD 49.99 / monthly