Moving users from email identity to Enterprise Identity
This guide walks you through migrating existing email/password users to Enterprise SSO connections (such as SAML, Entra ID, or other enterprise connections). This process uses just-in-time (JIT) provisioning to map existing users to their enterprise identities based on matching email addresses.
Identify one existing Kinde user who has an email/password identity.
Verify that this user’s email address in Kinde exactly matches their email address in your identity provider (capitalization and structure must be identical).
Ensure this test user has access to your test application.
Confirm you can access your identity provider’s sign-in logs and Kinde logs for verification purposes.
Disable the Enterprise Connection in Kinde to prevent further issues.
Collect debug information:
Check your identity provider’s sign-in logs for error messages.
Review Kinde logs for SAML processing errors.
Verify the ACS URL in your identity provider matches the one in Kinde.
Confirm the Entity ID matches in both systems.
Email address format mismatches: Different identity providers may return email addresses in different formats, which can prevent successful user mapping:
Ensure email addresses match exactly (case-sensitive) between Kinde and your IdP.
Verify the Email key attribute matches the exact attribute name your IdP uses (e.g., emailaddress, emailAddress, email, or full claim URIs).
Check your IdP’s SAML response to confirm the exact email format being sent.
Revert the test user back to email/password identity if needed.
User can initiate SSO login from the application and is redirected to your identity provider.
Your identity provider accepts credentials and returns a successful SAML response to Kinde (redirect to ACS URL).
Kinde either:
Maps the incoming SAML emailaddress to the existing Kinde user (when Trust email addresses is ON), preserving profile and permissions; or
Creates a new Kinde user via JIT provisioning with the SAML attributes if no match exists.
The user is redirected back to the application with a valid authenticated session and can access resources according to their preserved permissions.
Your identity provider’s sign-in logs show the successful authentication; Kinde logs show either the mapped existing user sign-in or creation of the user from the enterprise connection.
After migration completion and verification, Trust email addresses can be turned OFF and email/password login disabled for migrated accounts.
Users created in Kinde before March 2025 may experience an email capitalization mismatch that prevents proper syncing between their Kinde profile and Enterprise Connection identity.
This affects users created in Kinde before March 2025, regardless of whether they were originally created with email authentication or an Enterprise Connection. The email address stored in the Enterprise Connection may have incorrect capitalization that doesn’t match their existing Kinde profile, preventing automatic syncing during migration.
To resolve:
Delete the affected user in Kinde.
Have the user log in via their enterprise SSO.
Kinde will automatically create their enterprise identity with the correct email capitalization matching your identity provider.
This guide covered migrating existing email/password users to Enterprise Identity connections using just-in-time (JIT) provisioning. The migration process relies on email address matching between Kinde and your identity provider to map existing users to their enterprise identities.
Key takeaways:
Email addresses must match exactly (case-sensitive) between Kinde and your identity provider—verify your Email key attribute configuration matches your IdP’s SAML response format
Enable Trust email addresses during migration to enable automatic mapping, then disable it after all users have migrated for improved security
Test with a single user first, then expand to a pilot group before full rollout
Users created in Kinde before March 2025 may require manual resolution due to email capitalization issues
Monitor authentication logs during and after migration to ensure successful user mapping