Step 1: Set Your Entity ID in Nexadata
By default, Nexadata uses the Entity ID https://app.nexadata.com
.
Step 2: Create a Microsoft Entra ID Enterprise Application
In the Microsoft Entra ID admin center:
Navigate to Enterprise applications > New application.
Click Create your own application.
Name the app "Nexadata".
Choose Integrate any other application you don’t find in the gallery (Non-gallery).
This will set up a custom SAML application for Nexadata.
Step 3: Assign users to the nexadata application in Azure
Users must be assigned to the Nexadata Enterprise Application in Azure to use SSO. Additionally, ensure each user has:
First Name
Last Name
User Principal Name (UPN)
Email
You can manage assignments and user attributes in the Microsoft Entra ID admin center under the Nexadata application.
Step 4: Set up the SAML configuration in Azure
In the Enterprise Application for Nexadata:
Go to Single sign-on and choose SAML as the sign-in method.
Configure the following values (update
yourcompany.com
accordingly):
Setting | Value |
Identifier (Entity ID) |
|
Reply URL (ACS URL) |
|
Sign on URL |
|
Relay State | (Leave blank) |
Logout URL | (Leave blank) |
Step 5: Required Claims
Set the following Attributes and Claims:
Claim Name | Value |
Name ID |
|
firstName |
|
lastName |
|
|
Step 6: Upload Azure Federation Metadata into Nexadata
Once SAML settings are configured in Azure:
Scroll to the SAML Signing Certificate section in the same Azure application page.
Click Download next to Federation Metadata XML.
In Nexadata:
Navigate to Settings > Org > SSO Settings.
Locate the Identity Provider Metadata file upload field.
Upload the downloaded XML file directly.
This XML file contains all the necessary SAML information for Nexadata to recognise Azure as a trusted Identity Provider.
Step 7: Test the connection
After saving your settings:
Click Test Connection to simulate an SSO login.
Nexadata will validate your configuration and display:
Connection Status
Any Detected Issues
Details about the SAML response
Testing does not affect your current user's session or permissions, and you won’t be locked out if there’s a misconfiguration.
Step 8: Confirm the SSO Flow
Once everything checks out:
Log out of Nexadata
Log back in using Microsoft Entra ID (SSO) to verify the full SAML login flow.