Microsoft Entra ID - SSO
This guide walks you through configuring SAML 2.0 Single Sign-On (SSO) between Microsoft Entra ID (formerly Azure Active Directory) and Wintro. SSO allows your employees to access Wintro using their Microsoft corporate credentials, enhancing security and user experience.
Note: SSO configuration for Wintro requires coordination with our support team. After configuring your Identity Provider, you’ll need to share your metadata with us to complete the setup.
Prerequisites
Before starting the SSO configuration, ensure you have:
- Admin access to your Microsoft Entra ID tenant
- Admin access to your Wintro company account
- Microsoft Entra ID Premium license (P1 or P2) for SAML-based SSO
- Contact with Wintro support team to complete the configuration
Step 1: Add Wintro to Enterprise Applications
- Sign in to the Microsoft Entra admin center
- Navigate to Identity > Applications > Enterprise applications
- Click + New application
- Select + Create your own application
- Enter “Wintro” as the application name
- Select Integrate any other application you don’t find in the gallery (Non-gallery)
- Click Create
Step 2: Configure SAML Single Sign-On
- In your newly created Wintro application, go to Single sign-on from the left menu
- Select SAML as the single sign-on method
- Click Edit in the Basic SAML Configuration section
Basic SAML Configuration
Configure the following settings with Wintro’s SAML 2.0 endpoints:
- Identifier (Entity ID):
https://oqwjnxpmowajlgwaoqcs.supabase.co/auth/v1/sso/saml/metadata
- Reply URL (Assertion Consumer Service URL):
https://oqwjnxpmowajlgwaoqcs.supabase.co/auth/v1/sso/saml/acs
- Sign on URL:
https://wintro.app/auth/login
- Relay State:
https://oqwjnxpmowajlgwaoqcs.supabase.co
(Optional but recommended) - Logout URL: (Leave blank)
Click Save after entering all URLs.
Step 3: Configure User Attributes & Claims
- In the Attributes & Claims section, click Edit
- Ensure the following claims are configured:
Claim Name | Source Attribute |
---|---|
Unique User Identifier (Name ID) | user.mail |
emailaddress | user.mail |
givenname | user.givenname |
surname | user.surname |
name | user.displayname |
- To add or edit a claim:
- Click + Add new claim
- Enter the claim name
- Leave namespace blank
- Select Attribute as the source
- Choose the appropriate source attribute
- Click Save
Step 4: Download Federation Metadata
- In the SAML Certificates section, locate Federation Metadata XML
- Click Download to save the metadata file
- Alternatively, copy the App Federation Metadata URL to share with Wintro support
Step 5: Share Metadata with Wintro Support
After configuring your Microsoft Entra ID application:
-
Contact Wintro Support via:
- Email: support@wintro.ai
- Or through your dedicated Slack/Teams channel
-
Share your metadata using one of these methods:
- Option A: Send the downloaded Federation Metadata XML file
- Option B: Share the App Federation Metadata URL from Microsoft Entra ID
-
Provide additional information:
- Your company domain (e.g., yourcompany.com)
- List of email domains that should use SSO
- Whether you want to enforce SSO for all users or make it optional
-
Wintro Support will:
- Configure your SSO settings on our end
- Provide you with a test account for validation
- Schedule a brief call to walk through the testing process if needed
Timeline: SSO configuration typically takes 1-2 business days after receiving your metadata.
Step 6: Assign Users and Groups
Back in the Microsoft Entra admin center:
- Go to your Wintro application
- Select Users and groups from the left menu
- Click + Add user/group
- Select the users or groups who should have access to Wintro
- Click Assign
Best Practice: Create a dedicated security group (e.g., “Wintro Users”) and assign it to the application for easier management.
Step 7: Test the SSO Connection
After Wintro Support confirms your SSO configuration is complete:
Test from Microsoft Entra ID:
- In the Wintro application, go to Single sign-on
- Scroll to the Test single sign-on with Wintro section
- Click Test
- Select Sign in as current user or test with a specific user
- Verify successful authentication
Test from Wintro:
- Open a new incognito/private browser window
- Navigate to
https://wintro.app/auth/login
- Click Sign in with SSO
- Enter your company email address
- You should be redirected to Microsoft login
- After authentication, you should be logged into Wintro
IdP-Initiated Login (Optional):
- Navigate to myapps.microsoft.com
- Find and click the Wintro application tile
- You should be automatically logged into Wintro
Step 8: Roll Out to Your Organization
Once testing is successful, coordinate with Wintro Support to:
- Enable SSO enforcement (if desired) - requiring all users to authenticate via SSO
- Set up auto-provisioning rules - automatically creating accounts for new employees
- Configure session policies - timeout settings and remember me options
- Schedule employee communication - we can help with announcement templates
Troubleshooting
Common Issues and Solutions
“Invalid SAML Response” Error
- Verify the Reply URL in Entra ID matches exactly:
https://oqwjnxpmowajlgwaoqcs.supabase.co/auth/v1/sso/saml/acs
- Ensure you’ve shared the correct metadata with Wintro Support
- Check that the Name ID format is set to email address (user.mail)
“User Not Found” Error
- Confirm the email claim is properly mapped to user.mail
- Check that the user’s email in Entra ID matches their email in Wintro
- Enable auto-provisioning if users don’t exist in Wintro yet
“Access Denied” After Successful Authentication
- Verify the user is assigned to the Wintro application in Entra ID
- Check that the user has an active Wintro license
- Confirm the default role setting if auto-provisioning is enabled
Users Can’t Find SSO Login Option
- Ensure SSO is enabled in Wintro authentication settings
- Verify the correct domain is configured for SSO
- Check that users are entering their full email address
Getting Help
If you encounter issues not covered in this guide:
- Review the sign-in logs in Microsoft Entra ID for authentication failures
- Check browser console for any error messages
- Contact Wintro support (support@wintro.ai) with:
- Your company domain
- Screenshot of the error message
- Time and date of the failed attempt
- User email that experienced the issue
Security Considerations
- Certificate Rotation: Microsoft Entra ID certificates expire every 3 years. When rotation is needed, share the new metadata with Wintro Support
- Conditional Access: Consider implementing Conditional Access policies in Entra ID for additional security (MFA, device compliance, location restrictions)
- Regular Audits: Review SSO access logs monthly and remove access for terminated employees promptly
- Backup Authentication: Wintro Support can help configure emergency access procedures if needed
Next Steps
After successfully configuring SSO:
- Consider setting up SCIM provisioning for automated user management
- Configure Microsoft Teams integration for seamless collaboration
- Review and adjust session management settings for optimal security and user experience
- Train your IT helpdesk on the new SSO login process
Important URLs Reference
For your reference, here are the Wintro SAML 2.0 endpoints:
- ACS URL:
https://oqwjnxpmowajlgwaoqcs.supabase.co/auth/v1/sso/saml/acs
- Metadata URL:
https://oqwjnxpmowajlgwaoqcs.supabase.co/auth/v1/sso/saml/metadata
- Relay State URL:
https://oqwjnxpmowajlgwaoqcs.supabase.co
- Sign-on URL:
https://wintro.app/auth/login
With SSO configured, your employees can now access Wintro securely using their Microsoft credentials, eliminating password fatigue and enhancing your organization’s security posture.