Manage users across organizations
Manage users
Kinde supports the use of Microsoft Entra ID (SAML) as an enterprise-level authentication method. This service used to be Azure AD.
If you are importing users into Kinde, their Entra ID will be picked up and matched to the relevant connection based on their email address, for a seamless transition to Kinde.
Microsoft Entra ID is the new name for Microsoft Azure AD, which is Microsoft’s enterprise authentication service. This doc may contain some mixed references. More information.
You can make a connection available only to a specific organization, or you can create it so it can be used across any organization in your business.
Enter a Connection name. Make this something you can easily identify, especially if you are adding multiple connections for different business customers.
If you plan to import users into Kinde, make sure the connection name matches the connection name in the Entra ID record.
For the Entity ID, enter a random string like hEb876ZZlkg99Dwat64Mnbvyh129
. Make a copy of the string as you will add this to your SAML application later.
Scroll past the IdP metadata URL and other key attribute fields. We will ad dthis information later.
Enter Home realm domains. This speeds up the sign in process for users of those domains. Note that all home realm domains must be unique across all connections in an environment. For more information about how, see Home realm domains or IdP discovery.
If you use home realm domains, the sign in button is hidden on the auth screen by default. To show the SSO button, select the Always show sign-in button option.
Copy the ACS URL, you will need this for the SAML provider app.
If you want to enable just-in-time (JIT) provisioning, select the Create a user record in Kinde option. This saves time adding users manually or via API later.
Select if you want to treat this connection as a trusted provider. A trusted provider is one that guarantees the email they issue is verified. We recommend leaving this off for maximum security.
Select Save.
On the Microsoft Entra admin center home screen, select Applications > Enterprise Applications.
Select New application and in the next screen select Create your own application. A side panel opens.
Enter the name for the application.
Select the Integrate any other application you don’t find in the gallery (Non-gallery) option and then select Create. It can take a few seconds for the application to be created.
Select Get started on the 2. Set up single sign on tile, then select the SAML tile.
Edit the Basic SAML Configuration. The side panel opens.
Select Add identifier, then enter the same random string like you did previously for the Entity ID in Kinde. E.g. hEb876ZZlkg99Dwat64Mnbvyh129
.
Select Add reply URL and paste the ACS URL that you copied from the connection configuration screen in Kinde, then select Save.
Close the panel.
Select Edit on the Attributes & Claims section. Copy the values of the identifiers (Principal name, Given name, Surname), for example:
Make sure you test the connection before enabling in production for your users.
If your users sign in via the Entra ID (formerly Azure AD) enterprise connection in Kinde, when they sign out, they are just signing out of Kinde. They are not fully being signed out of Entra ID. It also works this way for social connections, where a third party is the identity provider.
For reference, see this Microsoft doc about configuring optional claims
ext_provider > claims > profile > groups
ext_groups