Skip to main content

How do I set up Single Sign-on with Entra ID?

Setting up SSO with Entra ID on your RSVPify workspace.

Updated today

Single sign-on (SSO) is an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials.

This article walks you through setting up an SSO with Entra ID.

Step 1: Navigate to Workspace settings and select the ‘SSO’ tab

Step 2: Click on the 'Add SSO Configuration' button

This will open the SSO configuration drawer. Here you will need to:

  1. Enter the domain that you will be using for SSO. After entering the domain, click the ‘Generate TXT record’ button. This will display the verification key that will be used to verify the ownership of the entered domain.

  2. To verify the ownership of the provided domain, you will have to add the verification key as a TXT record on your domain's DNS. Once the key is added, click on the ‘Verify domain’ button to complete the verification process.

Step 3: SSO Configuration from your Azure Active Directory

  1. In your Microsoft Azure portal, search for the ‘Enterprise Applications’ service


  2. Create new application within this service


  3. After clicking the ‘New application’ button, you will be redirected to the application gallery. In the gallery, chothe the ‘Create your own application’ option.


  4. In the application form, provide a name for the application (e.g., RSVPify SSO) and select the Non-gallery option


  5. After the application is created, you will be redirected to the application overview page. Within this page, select the ‘Set up single sign on’ option or choose the ‘Single sign-on’ item from the navigation bar.

  6. On the next screen, select ‘SAML’ as the sign-on method.

  7. Copy the following fields into the RSVPify SSO configuration modal

    Azure AD identifier -> Identifier / Entity ID

    Reply URL -> Reply URL


    These values are available in the RSVPify SSO configuration form. Click the ‘Edit’ button in the top right corner of this step and add values from RSVPify to your Basic SAML Configuration on Microsoft Azure.

  8. Attributes & Claims

    In this step, a custom claim must be added, which will be used for a successful SSO login to RSVPify.

    Click on the ‘Edit’ button on step 2 to open the Attributes & Claims configuration. On this page, select the ‘Add new claim’ option.


  9. Create a new claim with the name set to ‘email’ and source attribute set to ‘user.userprincipalname’ as shown in the image below:


  10. Save the new claim and navigate back to ‘Enterprise applications > SAML-based Sign-on’ page.

  11. SAML Certificates: Download the base64 certificate. Open the certificate using any text editor and copy its content to the RSVPIfy form.


  12. Set up “RSVPify SSO”. From this step, copy values to the corresponding fields in the RSVPify form.

    Login URL -> SAML 2.0 Endpoint (HTTP) or SSO URL
    Microsoft Entra Identifier -> Entity ID or Issuer URL


  13. After filling out all necessary fields, save the SSO configuration on RSVPify.

If everything is done correctly, the SSO configuration should be saved and in the ‘Configured’ state.

From this moment, all workspace members will have to use the SSO login flow and will not be able to log in using their email address and password.

Did this answer your question?