Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.jitera.ai/llms.txt

Use this file to discover all available pages before exploring further.

This guide walks you through connecting Jitera to Microsoft Entra ID (formerly Azure AD) using SAML 2.0. By the end, your team members can sign in to Jitera with their Entra ID credentials.
All values shown on this page are examples. Replace them with the actual values from your Entra ID tenant and Jitera organization.

Prerequisites

  • A Jitera organization on the Enterprise plan (SSO is an Enterprise-only feature)
  • Owner role in that Jitera organization
  • Global Administrator or Cloud Application Administrator role in your Entra ID tenant
  • One or more email domains you want to enforce SSO for (e.g. example.com)

What you will set up

SideWhatWhy
Entra IDEnterprise Application with SAML SSOTells Entra ID to trust Jitera as a service provider
JiteraSSO configurationTells Jitera to trust your Entra ID tenant as an identity provider
The setup requires copying values back and forth between the two sides. The steps below guide you through that in order.

Step 1: Open the Jitera SSO dialog

Go to Organization Settings > General and click the Single sign-on (SSO) row to open the configuration dialog. SSO section on the general settings page You will see two read-only values at the top. Keep this dialog open. You will need these values in the next step. Jitera SSO dialog with service provider values
FieldExample value
Issuerhttps://api.jitera.app/saml_sso/a1b2c3d4-e5f6-7890-abcd-ef1234567890
Assertion Consumer Service URLhttps://api.jitera.app/users/saml/auth

Step 2: Create an Enterprise Application in Entra ID

1

Open the Entra admin center

Go to Microsoft Entra admin center and sign in with an administrator account.
2

Go to Enterprise apps

In the left sidebar, click Enterprise apps.Enterprise applications list
3

Start creating a new application

Click + New application at the top. The Microsoft Entra App Gallery opens.Browse Microsoft Entra App Gallery
4

Create your own application

Click + Create your own application at the top. A dialog opens on the right.
  1. Enter a name for the application (e.g. Jitera)
  2. Select Integrate any other application you don’t find in the gallery (Non-gallery)
  3. Click Create Create your own application dialog
5

Open Single sign-on settings

After the application is created, you land on the application overview page. In the left sidebar under Manage, click Single sign-on.Application overview page
6

Select SAML

On the “Select a single sign-on method” page, click SAML.Select a single sign-on method
You are now on the SAML-based Sign-on page. The next steps fill in each section. SAML-based Sign-on overview

Step 3: Configure SAML in Entra ID

Basic SAML Configuration

Click Edit on the Basic SAML Configuration panel. A side panel opens.
  1. Click Add identifier and paste the Issuer value from Jitera
  2. Click Add reply URL and paste the Assertion Consumer Service URL from Jitera
  3. Leave Sign on URL, Relay State, and Logout Url empty
  4. Click Save at the top of the panel
Entra ID fieldPaste value from JiteraExample
Identifier (Entity ID)Issuerhttps://api.jitera.app/saml_sso/a1b2c3d4-e5f6-7890-abcd-ef1234567890
Reply URL (Assertion Consumer Service URL)Assertion Consumer Service URLhttps://api.jitera.app/users/saml/auth
Basic SAML Configuration panel

Attributes & Claims

Entra ID sends user attributes in the SAML assertion. Jitera needs three: email, first name, and last name. The default Entra ID claims already include these. Verify them by clicking Edit on the Attributes & Claims panel. Required claim:
Claim nameDefault value
Unique User Identifier (Name ID)user.userprincipalname
Additional claims:
Claim nameDefault valueMaps to Jitera field
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailuser.userprincipalnameEmail
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givennameuser.givennameFirst name
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surnameuser.surnameLast name
If your organization stores email addresses in user.mail instead of user.userprincipalname, update the email claim source accordingly. The value must match the actual email address your users sign in with.
No changes are needed if the defaults above match your directory. Attributes & Claims page Click on a claim row to see or edit its details. Manage claim edit page

Copy the metadata URL

Scroll down to section 3 - SAML Certificates on the same page. Copy the App Federation Metadata Url. It looks like this:
https://login.microsoftonline.com/a1b2c3d4-e5f6-7890-abcd-ef1234567890/federationmetadata/2007-06/federationmetadata.xml?appid=12345678-abcd-ef12-3456-7890abcdef12
You will paste this into Jitera in the next step. SAML Certificates and metadata URL

Step 4: Configure SSO in Jitera

Go back to the Jitera SSO dialog you opened in Step 1.
1

Paste the metadata URL

Select the Metadata URL tab, paste the App Federation Metadata Url you copied from Entra ID, and click Fetch.The IdP Entity ID, IdP SSO Service URL, and IdP Certificate Fingerprint fields auto-fill. The parsed certificate’s expiry date is displayed below the fingerprint and is color-coded — amber when 30 days or fewer remain, red when 7 days or fewer remain or the certificate has already expired.Metadata URL tab with fetched values
2

Enter email domains

In the Email domains field, enter the domains you want to enforce SSO for, separated by commas.Example: example.com, corp.example.comUsers with these email domains will be required to sign in through Entra ID.
3

Set attribute mapping

Update the attribute names to match the Entra ID claim names.
Jitera fieldSet to
Email attribute namehttp://schemas.xmlsoap.org/ws/2005/05/identity/claims/email
First name attribute namehttp://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
Last name attribute namehttp://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname
Attribute mapping fields
4

Save

Click Set up SSO. The configuration is saved and SSO is enabled immediately.
Once saved, users with the configured email domains are required to sign in via SSO. Make sure your Entra ID application is ready before saving.

Step 5: Assign users in Entra ID

Before you can test or sign in, users must be assigned to the Jitera application in Entra ID.
  1. In the Entra admin center, go to your Jitera enterprise application
  2. Click Users and groups in the left sidebar
  3. Click Add user/group and select the users or groups who should have access
Users and groups page Click Add user/group to open the assignment page. Add Assignment page Click None Selected under Users to search and select users. Select a user
Only users assigned to the application in Entra ID can authenticate. If a user sees an error when signing in, check that they are assigned.

Step 6: Test the connection

Back in the Jitera SSO dialog, click Test Connection.
  1. A new browser tab opens with the Entra ID sign-in page
  2. Sign in with a user account that is assigned to the application
  3. On success, a notification shows the extracted email, first name, and last name
  4. Verify the values match what you expect
Successful test connection showing extracted attributes If the test fails, see the troubleshooting section below.

Troubleshooting

Entity ID mismatch

Error: “The IdP Entity ID in the SAML response does not match your configuration.” The Identifier (Entity ID) in Entra ID does not match the Issuer value from Jitera. Open the Entra ID Basic SAML Configuration and verify the Identifier is set exactly to the Jitera Issuer value.

Certificate error

Error: “The SAML response signature could not be verified with the configured certificate.” The certificate fingerprint in Jitera does not match the signing certificate in Entra ID. This can happen when Entra ID rotates its certificate or the certificate has expired. Check the expiry date shown below the fingerprint in the SSO dialog — if it is close to expiry or has already expired, re-fetch the metadata URL in Jitera to update the fingerprint.

Domain mismatch

Error: “The email domain in the SAML response does not match your configured domains.” The email returned by Entra ID has a domain (e.g. @contoso.com) that is not listed in the Email domains field in Jitera. Add the domain to the list, save, and test again.

Missing attributes

Warning: “Some attributes could not be found in the SAML response.” One or more attribute names in Jitera do not match what Entra ID sends. Go to Attributes & Claims in Entra ID and verify the claim names match the values in Jitera’s attribute mapping fields.

User not assigned

The user sees an Entra ID error page saying they do not have access. Assign the user to the Jitera enterprise application in Entra ID (see Step 5).

Reference: field mapping summary

A complete view of where each value comes from and where it goes.
#ValueFromTo
1Issuer (SP Entity ID) e.g. https://api.jitera.app/saml_sso/{uuid}Jitera SSO dialogEntra ID > Basic SAML Configuration > Identifier
2Assertion Consumer Service URL e.g. https://api.jitera.app/users/saml/authJitera SSO dialogEntra ID > Basic SAML Configuration > Reply URL
3App Federation Metadata UrlEntra ID > SAML CertificatesJitera SSO dialog > Metadata URL
4Email domainsYour domain listJitera SSO dialog > Email domains
5Email claim nameEntra ID > Attributes & ClaimsJitera SSO dialog > Email attribute name
6First name claim nameEntra ID > Attributes & ClaimsJitera SSO dialog > First name attribute name
7Last name claim nameEntra ID > Attributes & ClaimsJitera SSO dialog > Last name attribute name