Skip to content
  • Auth and access
  • Enterprise connections

Moving users from email identity to Enterprise Identity

This guide walks you through migrating existing email/password users to Enterprise SSO connections (such as SAML, Entra ID, or other enterprise connections). This process uses just-in-time (JIT) provisioning to map existing users to their enterprise identities based on matching email addresses.

  • A Kinde account with existing users.
  • An enterprise app connected in Kinde, see the list of enterprise connections for more information.
  • Users with email addresses that match exactly their Enterprise Identity (capitalization and structure must match)
  • A test application in Kinde.

Test the integration with Kinde

Link to this section

Before testing with real users, verify the connection works correctly with a single test user. This helps identify any configuration issues early.

Enable the connection for your test application

Link to this section
  1. In Kinde, go to Environment > Settings > Authentication.
  2. Find your Enterprise Connection and select Configure.
  3. Scroll down to the Applications section.
  4. Toggle the connection ON for your test application. Ideally, this should be an application that is not publicly available.
  5. Select Save.

Prepare a test user

Link to this section
  1. Identify one existing Kinde user who has an email/password identity.
  2. Verify that this user’s email address in Kinde exactly matches their email address in your identity provider (capitalization and structure must be identical).
  3. Ensure this test user has access to your test application.
  4. Confirm you can access your identity provider’s sign-in logs and Kinde logs for verification purposes.

Test the SSO flow

Link to this section
  1. Open your test application in an incognito/private browser window.
  2. Initiate the SSO login flow:
    • If you configured home realm domains, enter the test user’s email address and select Continue. You should be redirected to your identity provider.
    • If you didn’t configure home realm domains, select the Sign in with Enterprise or SSO button.
  3. Authenticate with the test user’s identity provider credentials.
  4. After successful authentication, your identity provider should redirect back to Kinde (via the ACS URL).
  5. Kinde should process the SAML response and either:
    • Map to the existing Kinde user (if the email matches and Trust email addresses is enabled), preserving the user’s profile, roles, and permissions; or
    • Create a new Kinde user via JIT provisioning with the SAML attributes if no match exists.
  6. You should be redirected back to your application with a valid authenticated session.

Verify the test was successful

Link to this section

Check the following to confirm everything worked correctly:

In your identity provider:

  • Go to Sign-in logs and verify the authentication attempt appears.
  • Confirm the SAML response was sent successfully to Kinde.

In Kinde:

  • Go to Users and find your test user.
  • Verify the user’s profile information (name, email) was preserved.
  • Check that roles and permissions are intact (if applicable).
  • Review the user’s identity - it should now show the Enterprise Connection identity instead of email/password.

In your application:

  • Confirm the user can access protected resources.
  • Verify the session/token is valid.
  • Test that the user’s profile data is correctly displayed.

Test email/password login (optional):

  • Attempt to sign in with the test user’s email/password credentials.
  • If home realm discovery is configured, you should be redirected to your identity provider’s login page instead of the email/password form.

Troubleshooting

Link to this section

If the test doesn’t work:

  • Disable the Enterprise Connection in Kinde to prevent further issues.
  • Collect debug information:
    • Check your identity provider’s sign-in logs for error messages.
    • Review Kinde logs for SAML processing errors.
    • Verify the ACS URL in your identity provider matches the one in Kinde.
    • Confirm the Entity ID matches in both systems.
  • Email address format mismatches: Different identity providers may return email addresses in different formats, which can prevent successful user mapping:
    • Ensure email addresses match exactly (case-sensitive) between Kinde and your IdP.
    • Verify the Email key attribute matches the exact attribute name your IdP uses (e.g., emailaddress, emailAddress, email, or full claim URIs).
    • Check your IdP’s SAML response to confirm the exact email format being sent.
  • Revert the test user back to email/password identity if needed.
  • Fix any configuration issues and repeat the test.

For more information on troubleshooting SSO issues, see Troubleshoot SSO issues.

Pilot roll-out

Link to this section

Once you’ve successfully tested with a single user, expand testing to a small group of representative users:

  • Select several test users from different departments or teams.
  • Test across different browser configurations (Chrome, Firefox, Safari, Edge).
  • Have each test user complete the SSO login flow.
  • Monitor both Kinde and your identity provider’s logs for any errors or mapping problems.
  • Verify each user’s profile, roles, and permissions are preserved correctly.
  • Document any issues encountered and resolve them before proceeding to full migration.

Enable the connection for live applications

Link to this section

After successful pilot testing, enable the Enterprise Connection for your production applications:

  1. In Kinde, go to Environment > Settings > Authentication.
  2. Find your Enterprise Connection and select Configure.
  3. Scroll down to the Applications section.
  4. Toggle the connection ON for each production application that should use this Enterprise Connection.
  5. Select Save.

Complete migration and disable trust email

Link to this section

Once all existing users for that Enterprise Connection have signed in successfully at least once:

  1. In Kinde, go to Environment > Settings > Authentication.
  2. Find your Enterprise Connection and select Configure.
  3. Scroll down to the Trust email addresses provided by this connection option.
  4. Turn this setting OFF (improves security and prevents silent linking of emails).
  5. Select Save.

Post-migration checks and housekeeping

Link to this section

After completing the migration:

Link to this section

Audit logs:

  • Review Kinde logs for any unknown or failed sign-ins.
  • Check your identity provider’s sign-in logs for authentication issues.
  • Verify all expected users have successfully migrated.

Security:

  • Revoke or rotate any signing certificates if needed per your security policy.
  • Confirm that email/password login is disabled for migrated accounts (if desired).

User verification:

  • Spot-check user profiles to ensure data integrity.
  • Verify roles and permissions are correctly maintained.

Expected outcome (success criteria & what to look for)

Link to this section

Primary success criteria:

  • User can initiate SSO login from the application and is redirected to your identity provider.
  • Your identity provider accepts credentials and returns a successful SAML response to Kinde (redirect to ACS URL).
  • Kinde either:
    • Maps the incoming SAML emailaddress to the existing Kinde user (when Trust email addresses is ON), preserving profile and permissions; or
    • Creates a new Kinde user via JIT provisioning with the SAML attributes if no match exists.
  • The user is redirected back to the application with a valid authenticated session and can access resources according to their preserved permissions.
  • Your identity provider’s sign-in logs show the successful authentication; Kinde logs show either the mapped existing user sign-in or creation of the user from the enterprise connection.
  • After migration completion and verification, Trust email addresses can be turned OFF and email/password login disabled for migrated accounts.

Items to be aware of

Link to this section

Identity removal

Link to this section

At the moment when a user has been given an Enterprise Connection identity, their existing identity is removed from their profile at the same time.

Email capitalization issue

Link to this section

Users created in Kinde before March 2025 may experience an email capitalization mismatch that prevents proper syncing between their Kinde profile and Enterprise Connection identity.

This affects users created in Kinde before March 2025, regardless of whether they were originally created with email authentication or an Enterprise Connection. The email address stored in the Enterprise Connection may have incorrect capitalization that doesn’t match their existing Kinde profile, preventing automatic syncing during migration.

To resolve:

  1. Delete the affected user in Kinde.
  2. Have the user log in via their enterprise SSO.
  3. Kinde will automatically create their enterprise identity with the correct email capitalization matching your identity provider.

Customer IdP setup

Link to this section

Your customers’ IdP setups will be different from each other, we would recommend:

  1. Organising a time with them to agree to when the change will happen
  2. Flag with Kinde when this will happen, so we can be on hand to help
  3. Be on a call with them at the point of change to ensure they can authenticate in.

Doing this will mean that when there are nuances between IdP setups, they can be identified and addressed swiftly.

We would recommend, starting with a customer with a smaller user base first.

For more information on troubleshooting SSO issues, see Troubleshoot SSO issues.

This guide covered migrating existing email/password users to Enterprise Identity connections using just-in-time (JIT) provisioning. The migration process relies on email address matching between Kinde and your identity provider to map existing users to their enterprise identities.

Key takeaways:

  1. Email addresses must match exactly (case-sensitive) between Kinde and your identity provider—verify your Email key attribute configuration matches your IdP’s SAML response format
  2. Enable Trust email addresses during migration to enable automatic mapping, then disable it after all users have migrated for improved security
  3. Test with a single user first, then expand to a pilot group before full rollout
  4. Users created in Kinde before March 2025 may require manual resolution due to email capitalization issues
  5. Monitor authentication logs during and after migration to ensure successful user mapping