Skip to main content

Configure Microsoft Entra ID SAML SSO for Nexadata

Learn how to set up Single Sign-On (SSO) with Microsoft Entra ID using SAML for your Nexadata instance.

Jack Spence avatar
Written by Jack Spence
Updated over a week ago

Step 1: Set Your Entity ID in Nexadata

By default, Nexadata uses the Entity ID https://app.nexadata.com.

Step 2: Create a Microsoft Entra ID Enterprise Application

In the Microsoft Entra ID admin center:

  • Navigate to Enterprise applications > New application.

  • Click Create your own application.

  • Name the app "Nexadata".

  • Choose Integrate any other application you don’t find in the gallery (Non-gallery).

This will set up a custom SAML application for Nexadata.

Step 3: Assign users to the nexadata application in Azure

Users must be assigned to the Nexadata Enterprise Application in Azure to use SSO. Additionally, ensure each user has:

  • First Name

  • Last Name

  • User Principal Name (UPN)

  • Email

You can manage assignments and user attributes in the Microsoft Entra ID admin center under the Nexadata application.

Step 4: Set up the SAML configuration in Azure

In the Enterprise Application for Nexadata:

  • Go to Single sign-on and choose SAML as the sign-in method.

  • Configure the following values (update yourcompany.com accordingly):

Setting

Value

Identifier (Entity ID)

https://nexadata.yourcompany.com

Reply URL (ACS URL)

https://nexadata.yourcompany.com/sso/saml/consume

Sign on URL

https://nexadata.yourcompany.com/sso/saml/login

Relay State

(Leave blank)

Logout URL

(Leave blank)

Step 5: Required Claims

Set the following Attributes and Claims:

Claim Name

Value

Name ID

user.mail

firstName

user.givenname

lastName

user.surname

email

user.userprincipalname

Step 6: Upload Azure Federation Metadata into Nexadata

Once SAML settings are configured in Azure:

  • Scroll to the SAML Signing Certificate section in the same Azure application page.

  • Click Download next to Federation Metadata XML.

In Nexadata:

  • Navigate to Settings > Org > SSO Settings.

  • Locate the Identity Provider Metadata file upload field.

  • Upload the downloaded XML file directly.

This XML file contains all the necessary SAML information for Nexadata to recognise Azure as a trusted Identity Provider.

Step 7: Test the connection

After saving your settings:

  • Click Test Connection to simulate an SSO login.

  • Nexadata will validate your configuration and display:

    • Connection Status

    • Any Detected Issues

    • Details about the SAML response

Testing does not affect your current user's session or permissions, and you won’t be locked out if there’s a misconfiguration.

Step 8: Confirm the SSO Flow

Once everything checks out:

  • Log out of Nexadata

  • Log back in using Microsoft Entra ID (SSO) to verify the full SAML login flow.

Did this answer your question?