Microsoft Entra ID is an enterprise identity service that provides single sign-on (SSO), multifactor authentication, and conditional access services that you can easily integrate with Jotform. To get started, you need to enable Single Sign-On on your Jotform Enterprise server. You also need a Microsoft Entra account with admin permissions.
Creating Your Own Application
Jotform does not have an enterprise gallery application in Microsoft Entra ID, so you need to add a non-gallery application and configure it to use SAML-based SSO.
To create your own application
- Log in to your Microsoft Entra ID admin center.
- On the left, toggle Applications and click on the Enterprise Applications option.
- On the next page, select New Application.
- Next, in the Microsoft Entra App Gallery, select Create your own application.
- Enter a name for your app. Select the Non-gallery option, then click Create at the bottom.
The setup wizard will redirect you to the app’s overview page once your app is created. Proceed to the next section to configure your Security Assertion Markup Language (SAML).
Setting Up Single Sign-On With SAML
To configure SAML
- On your app’s overview page, go to Single sign-on under Manage on the left, then select SAML.
This will open the “Set up Single Sign-On with SAML” setup wizard, which consists of five parts. Continue by completing the first two parts — Basic SAML Configuration and User Attributes & Claims.
- Edit the first part, Basic SAML Configuration.
- Next, enter your Service Provider Metadata links.
The value to use for each field is as follows:
- Identifier (Entity ID) — Use your Jotform Entity ID
(e.g., https://example.jotform.com/sso/metadata.php). - Reply URL (Assertion Consumer Service URL) — Use your Jotform Service Provider Assertion Consumer Service URL
(e.g., https://example.jotform.com/sso/?acs). - Sign on URL (Optional) — Use your Jotform Service Provider Assertion Consumer Service URL but replace
?acs
with?login
(e.g., https://example.jotform.com/sso/?login).
- Save the changes, then exit the Basic SAML Configuration wizard.
- Now, edit the second part, Attributes & Claims.
- On the next page, select Unique User Identifier (Name ID).
- In the Source attribute field, enter user.mail. Save the changes, then exit the Attributes & Claims setup wizard.
Once that’s done, proceed to the next section to configure the Identity Provider Metadata settings in Jotform.
Integrating Microsoft Entra ID SSO With Jotform
After completing the initial setup, Basic SAML Configuration, and User Attributes & Claims settings in your app, the next step is to provide your Microsoft Entra ID details — which you can find in parts three and four of the “Set up Single Sign-On with SAML” setup wizard — to Jotform.
To integrate your Microsoft Entra ID SSO with Jotform
- In the “Set up Single Sign-On with SAML” setup wizard, scroll down to the SAML Signing Certificate section and download the Certificate (Base64).
- Next, take note of your app’s Login URL and Microsoft Entra Identifier URLs below the certificate section.
- Now, open your Jotform SSO settings page in a new tab and enter the details in the Identity Provider Metadata fields.
The value to use for each field is as follows:
- Entity ID — Use your Microsoft Entra Identifier.
- SSO URL — Use your Microsoft Entra Login URL.
- Certificate — Use the content of your Microsoft Entra Certificate (Base64) file. Use Notepad or TextEdit to view the certificate and copy only the value.
- SLO URL — Use your Microsoft Entra Logout URL.
- Go back to your Microsoft Entra ID SAML app page and assign your app to a user or group.
- Finally, go back to your Jotform SSO settings page and save your configuration.
Send Comment: