Microsoft Entra ID SSO Guide
This guide explains how to connect Yuno to Microsoft Entra ID (formerly Azure Active Directory) using SAML 2.0.
Prerequisites
- A Microsoft Entra ID tenant
- An application for use with Yuno
- Entra ID admin privileges to manage SSO settings
- Access to the Yuno dashboard
Step 1: Configure the basic SAML settings
First, go to the dashboard and click your profile image, then open Security. Navigate to the Single Sign-On (SSO) tab, click Set up and gather this info:
- Identifier (Entity ID)
- Assertion Consumer Service URL
In Microsoft Entra ID, go to:
Enterprise applications → All applications → Your application → Single sign-on
Under Basic SAML configuration, enter the values from the Yuno dashboard.
Step 2: Export and upload the federation metadata XML
In Microsoft Entra ID, navigate to the SAML certificates section and download the Federation Metadata XML file.
Then, in the Yuno dashboard:
- Upload the XML file under Yuno configuration → Option A: Upload metadata XML
- Wait for the Upload completed confirmation
- Click Save
Alternatively, you can take the information listed in Option B and enter it manually.
Step 3: Verify SAML certificate settings
In Microsoft Entra ID, open SAML certificates and make sure:
- The signing option is Sign SAML response and assertion
- The signing algorithm is SHA-256
Click Save to apply the changes.
Troubleshooting
If you cannot set up the SSO connection or run into issues after initial configuration:
- Remember Yuno requires signed SAML responses, check:
- Both the SAML response and the assertion are signed
- The signing algorithm is SHA-256
- The signing certificate matches the one uploaded to Yuno
- Review SSO logs in the Yuno dashboard under Security → Single sign-on (SSO)
Updated about 3 hours ago