# Azure Active Directory (Entra ID) SSO

Squadcast supports SAML 2.0-based Single Sign-On (SSO) login for Azure Active Directory (Entra ID) users. You can integrate your Squadcast Organization with your Azure Active Directory (Entra ID) SSO by following this integration guide.

### Pre-requisites <a href="#pre-requisites" id="pre-requisites"></a>

1. Account Owner / Administrator account in Squadcast

{% hint style="info" %}
**Point to Note:**

1\. Only an Administrator / Account owner can enable and configure Azure Active Directory SSO for an Organisation in Squadcast.\
\
2\. Once enabled, only the Account Owner can use email-password-based login **by default** although, it can be configured to enable email-password-based login for Administrators as well.
{% endhint %}

### Setup Guide <a href="#setup-guide" id="setup-guide"></a>

1\. Login to <mark style="color:red;">`app.squadcast.com`</mark> and navigate to **Settings** > **Extensions**. Click the **Configure** button under SSO

![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-50e69d268f4677c4c2e7d8b5ba89af509fd88bca%2Fazure_sso_gbs_1.png?alt=media)

2\. In the opened modal, select the **Custom SAML 2.0** tab and click **Show configuration guide for Custom SAML 2.0**

![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-6ac25c1beaf1dafd09e83e27349732b65f089b2e%2Fazure_sso_gb_1.png?alt=media)

As given in the displayed guide, copy the **ACS URL** shown in point 1

![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-bd7b8ea62f5cc7c9bb4faabfea0108c8df81df49%2Fazure_sso_gb_2.png?alt=media)

3\. Then, go to your Azure Active Directory (Entra ID) dashboard and click on **Enterprise applications** from the left navigation

![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-c317b43c7f77ff2fd898e7528e36f2149a3329f5%2Fazure_squadcast_4.png?alt=media\&token=8a3d9c06-41e4-41f2-860b-b9658ada2343)

4\. Click on **Create your own application** to create an application for Squadcast

<figure><img src="https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-3f8b121fdd1fd2650412e01719840bad87bc6963%2Fazure_sso_gb_3.png?alt=media" alt=""><figcaption></figcaption></figure>

5\. In the side panel, give a name for the application (such as Squadcast), select **Non-gallery Application**, and click on **Create.**

<figure><img src="https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-c1c65ffea51269d93d95cb275764de6d2488f892%2Fazure_sso_gb_4.png?alt=media" alt=""><figcaption></figcaption></figure>

6\. For the newly created app, in the left pane under **Manage**, select **Users and groups**

![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-ee9fb7c6e871769029e27cf6c7c1a6f1ec82d6da%2Fazure_squadcast_7.png?alt=media\&token=e0d8e024-f011-4306-9b41-aa99125a4f96)

Now, click on **Add user**

![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-f18b104d92b5fec52b6da98fa0042dbc2cd29a1a%2Fazure_squadcast_8.png?alt=media\&token=74bf67a0-a8af-4835-83b9-3772fd9f6a32)

7\. Find and add the users you want to, along with the appropriate **Role**

![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-2fe4c887bf6578a87fdd977d7cfae87f95d868e2%2Fazure_squadcast_9.png?alt=media\&token=3cb72523-5a76-4d4f-a7a1-292837b431b6)

8\. In the left pane under **Manage**, click **Single sign-on** and select **SAML**

![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-4bd5e2267356e21c3a48b02abdb827c2cbf0c099%2Fazure_squadcast_10.png?alt=media\&token=11bbd5db-4219-40bb-8314-80cb90c360b5)

9\. Edit the **Basic SAML Configuration** section

In both, the **Identifier (Entity ID)** and **Reply URL (Assertion Consumer Service URL)** placeholders, paste the **ACS URL** you copied previously from Squadcast here

![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-ce65d3d5c3313f3964b43b5ded7468d4c850e9d4%2Fazure_squadcast_11.png?alt=media\&token=99312c38-f71a-4d0f-8004-d0a67a588aa3)

10\. Next, edit the **User and Attributes Claims** section

![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-4ab968739b3ffc56f383f01186de2dcec79e3356%2Fazure_squadcast_12.png?alt=media\&token=befbd029-1f27-46d3-b495-184c118ffc89)

Remove the *namespace* and use:

* <mark style="color:red;">`first_name`</mark> for source attribute <mark style="color:red;">`user.givenname`</mark>
* <mark style="color:red;">`email`</mark> for <mark style="color:red;">`user.mail`</mark>
* <mark style="color:red;">`last_name`</mark> for <mark style="color:red;">`user.surname`</mark>

![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-57ca92d7e792821f1c69e28463d405d2d751ff56%2Fazure_squadcast_13.png?alt=media) ![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-24d9b336a8511979fcf695ddc80c0c51df84b959%2Fazure_squadcast_14.png?alt=media) ![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-3786e09870e933e9195a5ddc72fcb3b064a81261%2Fazure_squadcast_15.png?alt=media)

11\. Click on the **Edit** icon in the **SAML Signing Certificate** section

![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-4540297d6d67b0c0bd46cd73ebc7eb75d06a76e4%2Fazure_squadcast_20.png?alt=media)

Here, **download the PEM certificate**

![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-36ab7d0c1a92e231d496c9907e824f92dbb43fc9%2Fazure_squadcast_16.png?alt=media)

12\. From under the **Setup Squadcast** section, copy the **Login URL**

![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-b2128ed8bb3e64d380a80c497312aba0ed2e48a4%2Fazure_squadcast_17.png?alt=media\&token=d1801e37-f14d-4ba0-81f1-3bd5ae4a604c)

13\. Back in Squadcast, in the previously opened modal:

* Paste the copied **Login URL** in the placeholder for **SAML 2.0 Endpoint**
* Copy the contents of the **PEM Certificate** in the placeholder for **X.509 Certificate**
* Enter the domain name of your Organization

{% hint style="info" %}
**Note:**

Make sure to add the **Domain Name** of your Organization, for SSO login to work
{% endhint %}

* Provisioning new users can default to a particular <mark style="color:red;">`User Role`</mark> from the drop-down
* You can allow the <mark style="color:red;">`Account Owner`</mark> to also log in using their email credentials in addition to SSO. This can be done by checking the boxes for those options
* You can simply *provision new users on their first log in* by enabling the checkbox for the same

Once all of this has been configured based on your requirements, click on **Save**

14\. That’s it, your configuration is now complete!

For testing this SSO integration and if it's working as expected, go back to the Azure Active Directory SSO portal, and click on **Test**

Then, click **Sign in as a current user** to verify your login to Squadcast!

![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-8db40fc568849ccf842b5e4237592b525de4b638%2Fazure_squadcast_19.png?alt=media\&token=b691a951-4a30-42a6-985e-70c108e3e217)

15\. Activate this SSO integration by *enabling the toggle*

![](https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-139a2f2f9c70ee7426eab0a4eba48790c6db964e%2Fazure_sso_gb_5.png?alt=media)

{% hint style="info" %}
If you want to sync user removal between Azure AD (Entra ID) and your Squadcast organisation, you need to enable this checkbox. Whenver a user is removed in Azure AD (Entra ID), that user will be removed removed from Squadcast as well.

If you want Squadcast to only consider a certain Group in Azure AD (Entra ID), then add the specific Group ID. If this is not entered, and the checkbox is enabled, all users in Azure AD (Entra ID) will be checked for syncing and removal.

**Important:** This will also require the Microsoft Teams bot to have Admin permissions.

<img src="https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2FkqEluWlFOOfVT8Cu0PtQ%2FScreenshot%202026-04-14%20at%204.43.22%E2%80%AFPM.png?alt=media&#x26;token=603fd400-c9d1-4206-9670-a3031960d147" alt="" data-size="original">
{% endhint %}

16\. To login to Squadcast via Azure Active Directory SSO from here on, **within your Office 365 account, click on App Launcher, click on All Apps and you will be able to see Squadcast** there. Unless you have enabled email-password-based login for your User Role, you will not be able to login to Squadcast using email-password from our web app[ <mark style="color:blue;">login page</mark>](https://app.squadcast.com/).

{% hint style="info" %}
**Logging in from the Squadcast mobile app when Azure AD SSO is enabled:**

The user needs to first access and log in to [<mark style="color:blue;">myapplications.microsoft.com</mark>](https://myapplications.microsoft.com/) in the mobile browser. Here, they will be able to see the configured SSO (for Squadcast, as shown in the screenshot below). They can simply click on the icon to *log in*.

<img src="https://1574591692-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F8TaWz01jmUJl58p4ZVel%2Fuploads%2Fgit-blob-9038ebbc160a70ffc635b033bd6371bff351ec6a%2Fazure_squadcast_22.png?alt=media&#x26;token=083e0639-32b7-4daf-8321-8393f9814ef2" alt="" data-size="original">
{% endhint %}

{% hint style="warning" %}
**Important:**

1. We do not support the provisioning and syncing of **Groups** from Azure AD (Entra ID) SSO into Squadcast. We support this only for **Users**.
2. To login to the Squadcast web app when Azure AD SSO is enabled, users can use **My Apps Secure Sign-in Extension** for easy login.
   {% endhint %}

*Have any questions?* [*Ask the community*](https://community.squadcast.com/view/home)*.*
