Skip to main content

SSO - Microsoft Entra (Azure AD) Configuration Example

This example shows you how to configure Microsoft Entra for Frontify.

Updated over 2 weeks ago

SSO (Single Sign-On) offers a quick and convenient login method for all employees. With SSO, you can automatically grant viewing access to all, or selected, employees within your company. SSO is available as an add-on for Enterprise accounts. For more details, please refer to our introduction and FAQ.



Getting started

To enable SSO for your brand portal, go to the Customer Hub and look for the option to submit an SSO setup request (under the Ecosystem section).

Once your request is submitted, our Support team will contact you by email to complete the setup.

If you need help with your SSO configuration at any point, feel free to reach out to support@frontify.com.



MS Entra - Configuration example

Frontify is part of the Microsoft Entra App Gallery:

Browse to Identity > Applications > Enterprise applications > Frontify > Single sign-on.

On the Select a single sign-on method page, select SAML.

On the Set up single sign-on with SAML page, click the pencil icon for Basic SAML Configuration to edit the settings.

Within the Basic SAML Configuration please add those URLs and replace DOMAIN with your current Frontify URL.

* Please be aware that configuring the Relay State and Logout URL as mandatory, rather than optional as offered by Entra, is essential.

After clicking on each claim, you can edit them to be mapped to the Frontify required attributes (User.email, User.FirstName, User.LastName) like this:

From the SAML Signing Certificate section, download the Federation metadata XML file or copy the App Federation Metadata Url and pass it on to your Frontify contact.


Group Mapping with Entra

Please see the general overview on setting up group mapping here.

After adding the groups attribute to your Attributes & Claims, you can choose which Entra groups should be sent to Frontify with users. This is helpful if you have many Entra groups and only want some groups to be mapped to Frontify.

Important to note: assigning groups to the application is separate from user provisioning. You might provision only certain groups to have access to Frontify but what we are referring to in Attributes & Claims are what groups are being sent to Frontify for group mapping.

You can follow the screenshots below to Add group claims:

Recommended: If possible, configure the group claim to send a human-readable group name (not the group object ID / GUID) to Frontify. This will make it easier for Frontify Admins to map Entra groups to Frontify groups.

In Microsoft Entra ID:

  • For Active Directory–synced groups, this is typically sAMAccountName.

  • For cloud-only groups, configure the claim to send the Cloud-only group display names.

Ensure that the value sent in the SAML token exactly matches the group name configured in Frontify. This must be a match whether the text-base group name is sent or the numerical ID.

To do this, a Frontify Admin must add that user group name in the "SSO group mapping" field in Frontify in order to map users to the associated Frontify group:

Detailed information about SSO group mapping can be found in this article.

Did this answer your question?