Azure AD / Entra ID SSO + SCIM
For tenants on Microsoft Entra ID (the modern name for Azure AD). This is the most common path for Claresia customers running Microsoft Copilot M365.
Total time: 10–15 minutes.
Part 1 — SSO (OIDC recommended for Entra ID)
Section titled “Part 1 — SSO (OIDC recommended for Entra ID)”-
In Claresia Onboarding Portal, click Configure SSO (Step 4). Choose the Azure AD / Entra ID tab. Pick OIDC (recommended) or SAML 2.0.
-
In Entra Admin Center, go to Applications → Enterprise Applications → New application → Create your own application.
- Name:
Claresia - Choose: Integrate any other application you don’t find in the gallery
- Name:
-
After creation, open Single sign-on (left nav). Pick OpenID Connect (or SAML if your tenant policy requires).
-
OIDC path:
- Copy the Application (client) ID + Directory (tenant) ID from Overview
- Under Certificates & secrets → New client secret, generate a secret, copy the value (it shows only once)
- Under Authentication → Add a platform → Web:
- Redirect URI:
https://api.workos.com/sso/oidc/callback(the portal displays the exact URL) - Front-channel logout URL: leave blank
- ID tokens (used for implicit and hybrid flows): checked
- Redirect URI:
- Under API permissions, ensure
openid,profile,email,offline_accessare granted (admin consent)
-
Back in Claresia Onboarding Portal, paste:
- Issuer URL:
https://login.microsoftonline.com/<tenant-id>/v2.0 - Client ID
- Client secret
- Click Test login. A popup opens, you authenticate as an Entra user, green check returns.
- Issuer URL:
Part 2 — SCIM provisioning
Section titled “Part 2 — SCIM provisioning”-
In Claresia Onboarding Portal, click Configure SCIM (Step 5). Copy the SCIM endpoint URL + bearer token.
-
In Entra Admin Center, open your Claresia enterprise app → Provisioning → Get started.
-
Provisioning Mode: Automatic.
-
Tenant URL: paste the SCIM endpoint URL. Secret Token: paste the bearer token. Click Test Connection — should return success.
-
Under Mappings:
- Provision Microsoft Entra ID Users → keep defaults; ensure
userPrincipalName→userName,givenName→name.givenName,surname→name.familyName,mail→emails[type eq "work"].value - Provision Microsoft Entra ID Groups → enable
- Provision Microsoft Entra ID Users → keep defaults; ensure
-
Under Settings:
- Scope: Sync only assigned users and groups
- Provisioning Status: On
-
Save.
-
Under Users and groups, Add user/group → assign your
claresia-*groups (or individual users for piloting). -
Back in Claresia Onboarding Portal, click Sync now. Should show imported user + group counts within ~60 seconds (initial sync from Entra is slightly slower than Okta).
Part 3 — Group → role mapping
Section titled “Part 3 — Group → role mapping”| Entra group | Claresia role | Notes |
|---|---|---|
claresia-admins | tenant_admin | Full access |
claresia-auditors | auditor | Read + audit log |
claresia-users | member | Default |
claresia-eng-pilot | member + archetype eng_lead | Pilot cohort |
Conditional Access recommendations
Section titled “Conditional Access recommendations”For Mode B/C deployments handling sensitive data:
- Require MFA on Claresia sign-in
- Block sign-in from non-corporate IP ranges (or require Compliant Device)
- Set session lifetime to 8 hours (Claresia’s JWT refresh is 5-min sliding; this caps the absolute session)
Common gotchas
Section titled “Common gotchas”| Symptom | Cause | Fix |
|---|---|---|
AADSTS50011 redirect URI mismatch | Redirect URI typed wrong | Re-copy from portal exactly |
AADSTS900561 PUT method not allowed | OIDC tokens not enabled in Authentication blade | Re-tick ID tokens |
| SCIM “Quarantine” state in Entra | Bearer token expired or wrong | Re-generate from portal, paste fresh |
| Test connection returns 401 | Bearer token typo | Copy from portal again — don’t retype |
| Test connection returns 403 | SCIM endpoint accessible but bearer doesn’t have write scope | Generate a new bearer from portal (forces a refresh) |