Single sign on: Azure/Entra

Integrate Azure/Entra SSO with your account

Schuyler Welch avatar
Written by Schuyler Welch
Updated over a week ago

To set up SSO with, you'll need to create a new enterprise application within Azure/Entra. Any users signing into will need to have assigned access to this application, and will have to authenticate from your clinic sign-in page which will appear similar to (be sure to replace subdomain with your actual clinic subdomain).

Not using Azure/Entra for SSO? See our guides for integrating Okta or Auth0.


From your Azure/Entra dashboard, go to Enterprise applications.

Enterprise Applications tab
  1. Select + New application.

  2. Select + Create your own application or Non-gallery application.

    • Give your app an identifier or simply use your clinic domain as the name.

    • Select Integrate any other application you don't find in the gallery.


From the Overview tab, go to the Single sign-on tab and select SAML as the protocol.

Single sign-on protocol

Basic SAML Configuration:

  1. Set the below URL as your Identifier (Entity ID)

  2. Set the below URL as your primary Reply URL (Assertion Consumer Service URL)

  3. Set the below URL as your secondary Reply URL

  4. Set the below URL as your Relay State

User Attributes & Claims:

  • Set your Unique User Identifier to: user.mail authentication validates the user account email against the email present in Azure/Entra identity management, and they will need to be identical.

    If users typically log in to other applications using a shortener such as firstnamelastname or username, then a claim transformation may be needed specifically for to pass the email instead.

Example configuration:

SAML sign-on configuration overview

A few things your CSM or support representative will need from your configuration:

  • Login URL

  • App Federation Metadata URL (or XML file)

JIT (Just-In-Time provisioning)

With JIT enabled, you can create and assign new users to your app without needing to manually invite or create accounts first. Once an assigned new user authenticates, they'll be prompted to finish setting up their account by selecting a room name before being taken to the dashboard.

  • To remove a clinic user or seat, an account admin will still need to manage that from Account Settings / Clinic Settings / Manage Users.

A few things to note:

  • Once enabled, SSO will replace the traditional sign-in methods for your clinic.

  • When logging in, users will need to authenticate from their clinic login page rather than an external app dashboard.

  • Existing users can always log in using email/password by going to and will see an optional redirect to their clinic dashboard.

If you have any questions or would like assistance with configuration, please contact your CSM or chat with our support team 🙂

Did this answer your question?