Configure Microsoft Entra ID (formerly Azure AD) as a SAML IdP for Bytescale.
In Azure Portal, open Microsoft Entra ID → Enterprise applications.
Create a new non-gallery application.
Open Single sign-on and select SAML.
In Basic SAML Configuration, set Identifier (Entity ID) and Reply URL (ACS) using the Bytescale values.
In Attributes & Claims, set the Name ID format to Unspecified and set the source attribute to user.mail.
If user.mail is empty in your tenant, use user.userprincipalname instead.
Group membership is not required for Bytescale SSO.
Add these claims:
| Name | Source attribute |
|---|---|
| http://schemas.xmlsoap.org/ws/2005/05/identity/claims/email | user.mail |
| http://schemas.xmlsoap.org/ws/2005/05/identity/claims/firstName | user.givenname |
| http://schemas.xmlsoap.org/ws/2005/05/identity/claims/lastName | user.surname |
Download the Federation Metadata XML and paste it into Bytescale.
Verify each email domain by clicking it in the SSO IdP table.
Bytescale will not use your IdP until the domain is verified, and it will check the domain for up to 72 hours.
This website uses cookies. By continuing you are consenting to the use of cookies per our Cookie Policy. Our legal policies were last updated August 16 2024.
This website requires a modern web browser -- the latest versions of these browsers are supported: