Skip to content
  • There are no suggestions because the search field is empty.

Microsoft Entra ID SSO Setup

This article outlines how to setup SSO with Microsoft Entra ID

Create New Enterprise Application

If you would like to set up SSO with Azure AD, please follow the steps below:

  • Next, input the name for your new application:
    • Enter "Security Journey" and click "Create"
  • From the SSO Overview page, choose "Set up single sign on."​
Screenshot 2025-09-02 at 9.42.58 AM

 

Basic SAML Configuration 

In Section 1, update the Basic SAML Configuration:
  • Entity ID: urn:amazon:cognito:sp:us-east-1_CHi5tsM8X
  • Assertion Consumer Service URL: https://auth.hackedu.com/saml2/idpresponse
  • Sign on URL: https://my.securityjourney.com/?domain=(insert your domain)
Screenshot 2025-04-23 at 10.48.26 AM

Attributes & Claims

By default, Microsoft Entra maps user.userprincipalname as the Unique User Identifier, which Security Journey uses as the user’s emailAddress.

Only Email, First Name, and Last Name are required to create a user, but additional learner attributes can be added via SAML Claims. See this article for supported fields and configuration details.

Screenshot 2025-09-02 at 9.54.16 AM

SAML Certificates

In Section 3, download your new application's Federation Metadata XML and upload it to the Security Journey Platform here

Screenshot 2025-09-02 at 10.17.30 AM