# How to set up an Entra ID Enterprise App for SignSpace SSO

Learn how to add Enterprise Application in Entra ID and configure it to use with SignSpace to enable SSO.&#x20;

### Preconditions <a href="#preconditions" id="preconditions"></a>

To create Enterprise Application in Entra ID, user must at least have Cloud Application Administrator or Application Administrator role in Entra ID.

### Configuration process <a href="#configuration-process" id="configuration-process"></a>

Follow these configuration steps to set up SSO for SignSpace.

In Entra ID dashboard got to **Applications** →

**Enterprise Applications** <img src="https://pf-emoji-service--cdn.us-east-1.prod.public.atl-paas.net/atlassian/productivityEmojis/01-circle-red-64px.png" alt="1 One Circle Red" data-size="line"> → **New Application** <img src="https://pf-emoji-service--cdn.us-east-1.prod.public.atl-paas.net/atlassian/productivityEmojis/02-circle-red-64px.png" alt="2 Two Circle Red" data-size="line"> **.**

<figure><img src="/files/8qQRHvt0EwvR9BJQPxMU" alt=""><figcaption></figcaption></figure>

From App gallery search **AWS Single-Account Access.**

<figure><img src="/files/fvJ5H2brpWaylUNnip6I" alt=""><figcaption></figcaption></figure>

In the right corner provide app name, click **Create**.

<figure><img src="/files/fbf0OUlRKkTyn8FMGgCZ" alt=""><figcaption></figcaption></figure>

&#x20;

Return to Enterprise applications list. Select newly created application, got to **Single sign-on.**

<figure><img src="/files/Rs1KGFywClDSq2xofo4U" alt=""><figcaption></figcaption></figure>

Select **SAML**.

<figure><img src="/files/bKpQg6QebfNTcTJTqX9K" alt=""><figcaption></figcaption></figure>

In **Basic SAML Configuration** card click **Edit**.

<figure><img src="/files/TrTELb5VyXrj1suriMhr" alt=""><figcaption></figcaption></figure>

In identifier field, add this value: `urn:amazon:cognito:sp:eu-north-1_U4Od0xofm`.

<figure><img src="/files/FVtPBJOhYLlBVRmCX7nv" alt=""><figcaption></figcaption></figure>

Reply URL, add this value: [*https://3e3da9b8-3b83-9aaf-e45a-9a8d77989e34.auth.eu-north-1.amazoncognito.com/saml2/idpresponse*](https://3e3da9b8-3b83-9aaf-e45a-9a8d77989e34.auth.eu-north-1.amazoncognito.com/saml2/idpresponse)

<figure><img src="/files/BAIx4RkCNw9LtYiGrrdb" alt=""><figcaption></figcaption></figure>

Logout URL, add this value: <https://app.signspace.com/srv/logout/>

<figure><img src="/files/219wDhRkLS4Ky8paDt3b" alt=""><figcaption></figcaption></figure>

{% hint style="info" %}
**Why logout URL should be added?**&#x20;

When a user logs out from SignSpace, they must also be logged out of Entra ID. This process is triggered by redirecting to the Cognito logout URL, which also logs the user out of Entra ID before returning them to SignSpace. If the logout URL is not set, the user will remain on the Entra ID logout page and will not be redirected back to SignSpace.
{% endhint %}

Click Save

In **Attributes & Claims** card select **Edit** .

<figure><img src="/files/28ckYyxIc2T9I4eOOAR5" alt=""><figcaption></figcaption></figure>

Add new claims under additional claims

<figure><img src="/files/S3SYbcLjOVwEeENYroLu" alt=""><figcaption></figcaption></figure>

We need these fields:

**givenname** *-* first name,

**surname** - last name,

**email** *-* automatically created name uses user.userprincipalname, which is email,

**phonenumber** - in international format (+\<country\_code>\<number>),

**permissions** - is a string field, where company code, role, permissions are stored. This is the format: `[{"org": <ID1>, "role": "basic", "perms": ["perm1", "perm2"], "groups": ["group1", "group2"]}, {"org": <ID2>, "role": "basic", "perms": ["perm1", "perm2"], "groups": ["group1", "group2"]}]`&#x20;

Detailed specification provided earlier. If this field is not provided, user will be assigned to main organisation, role *basic* , no permissions, no groups. This field is a custom field, that Entra ID specialist should be able to create and map accordingly.

Detailed explanations of **permissions** field:

* **org** - business ID, type: string, example: “1234567-1”, MANDATORY;
* **role** - user role, type: string, example: “basic”(if role is left empty, default is “basic”), OPTIONAL, available choices: “basic”, “main”;
* **groups** - user groups, type: list of strings, example: \[“group:66c2f6eb7c62df056d4699e1”]), OPTIONAL;
* **perms** - permissions to user, type: list of strings, example: \[“sign\_enabled“, “request\_enabled”], OPTIONAL, available choices:

| **Permission** | **ID (enabled)** | **ID (disabled)** |
| -------------- | ---------------- | ----------------- |
| Signing        | sign\_enabled    | sign\_disabled    |
| Groups create  | group\_enabled   | group\_disabled   |
| Request create | request\_enabled | request\_disabled |
| Batch signing  | batch\_enabled   | batch\_disabled   |
| Deletion       | del\_enabled     | del\_disabled     |

<figure><img src="/files/WrkkLJQ8B9s4s02wtQ6e" alt=""><figcaption></figcaption></figure>

*Preview of claim management*

Use this namespace for fields: [*http://schemas.xmlsoap.org/ws/2005/05/identity/claims*](http://schemas.xmlsoap.org/ws/2005/05/identity/claims).

If all users will have same permissions, static line to **permissions** claim can be added. It should be added in **source attribute** field. Instead of choosing attribute, static string can be entered in search area, and after pressing **Enter** on keyboard, this string will stay:

<figure><img src="/files/wRI3oHqBUiJiBc68Saz9" alt=""><figcaption></figcaption></figure>

Example line:

`[{"org": "1234567-8","role": "basic", "perms": ["sign_enabled", "request_enabled", "group_enabled", "batch_enabled"], "groups": ["group:65e6d7959c16477da96522f7"]}]`

This means, that user will be assigned to organisation with business ID `1234567-8` as a basic user, and will have signing, groups create, requests create and batch signing permissions. User is added to group, with ID `group:65e6d7959c16477da96522f7` as a basic member.

After all the fields assigned, from **SAML Certificates** card we need **App Federation Metadata Url** <img src="https://pf-emoji-service--cdn.us-east-1.prod.public.atl-paas.net/atlassian/productivityEmojis/01-circle-red-64px.png" alt="1 One Circle Red" data-size="line"> or **Federation Metadata XML** <img src="https://pf-emoji-service--cdn.us-east-1.prod.public.atl-paas.net/atlassian/productivityEmojis/02-circle-red-64px.png" alt="2 Two Circle Red" data-size="line"> file. This URL is preferred.

<figure><img src="/files/AZ4RLBjZ8V3ouuCvOmez" alt=""><figcaption></figcaption></figure>

After an app is created, users, who can login with that app must be assigned in **Users and Groups**

![](/files/kZVqUO2nZXpteJpUpMvn)![image-20250127-150435.png](blob:https://vastuugroup.atlassian.net/df83d48d-7dfc-4973-b440-b2868c1fac5f#media-blob-url=true\&id=5f03614d-1da2-4ed3-b11b-c14cfb7d28f9\&collection=contentId-720273496\&contextId=720273496\&mimeType=image%2Fpng\&name=image-20250127-150435.png\&size=27254\&width=271\&height=501\&alt=image-20250127-150435.png)

Click Add user/group:

![](/files/LejwMspfIxLTCMI4diaA)

At first, select **None Selected** <img src="https://pf-emoji-service--cdn.us-east-1.prod.public.atl-paas.net/atlassian/productivityEmojis/01-circle-red-64px.png" alt="1 One Circle Red" data-size="line"> , then select users <img src="https://pf-emoji-service--cdn.us-east-1.prod.public.atl-paas.net/atlassian/productivityEmojis/02-circle-red-64px.png" alt="2 Two Circle Red" data-size="line"> , who can use this SSO, click **Select** <img src="https://pf-emoji-service--cdn.us-east-1.prod.public.atl-paas.net/atlassian/productivityEmojis/03-circle-red-64px.png" alt="3 Three Circle Red" data-size="line">

<figure><img src="/files/3Dl6To9kE4cvSIbD2kQg" alt=""><figcaption></figcaption></figure>

**Test this application** is optional, but not required. This will provide information, if all the claims are provided. Also download SAML response is useful, when we need to map fields in cognito side.

<figure><img src="/files/oW4RhdWHqLtCzfJiSHxd" alt=""><figcaption></figcaption></figure>

### For more information

Learn how to integrate AWS Single-Account Access with Microsoft Entra ID:

[<img src="https://learn.microsoft.com/favicon.ico" alt="" data-size="line">Tutorial: Microsoft Entra SSO integration with AWS Single-Account Access - Microsoft Entra ID](https://learn.microsoft.com/en-us/entra/identity/saas-apps/amazon-web-service-tutorial)

Contact the SignSpace team for more information: <customerservice@signspace.com>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://guide.signspace.com/en/managing-your-organisation-account/how-to-set-up-an-entra-id-enterprise-app-for-signspace-sso.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
