Skip to main content

Azure SSO

Connect your Azure Active Directory with Knak to enable secure, single sign-on (SSO) access for your team.

Updated this week

Before You Begin

Make sure you have:

  • Admin access to both Knak and Azure

  • A test user configured in both systems

Video for Azure SSO Set Up Guidance


Step 1: Configure SSO in Knak

  • Go to Admin > Company > Settings > SSO in Knak.

  • Click Configure.

    “Configure” button in admin settings.
  • Copy the following values:

    • Single Sign-On URL

      Example: https://knak.auth0.com/login/callback?connection=myCompany

    • Audience URI

      Example: urn:auth0:knak:myCompany

Step 2: Set Up SAML Configuration in Azure

  • Go to Azure Portal > Enterprise Applications.

  • Create your Knak application.

    • Select Add > Enterprise Application > Create your own Application.

    • Input Knak as the application name.

    • Select Integrate any other application you don’t find in the gallery (non gallery)

    • Press Create.

  • Navigate to Single Sign-on > SAML-based Sign-On

  • Enter the values from Knak:

    • Paste the Single Sign-On URL into the Reply URL (Assertion Consumer Service URL) field.

    • Paste the Audience URI into the Identifier (Entity ID) field.

    Azure SAML fields.

Note: Do not populate the Sign on URL (Optional) field.

Step 3: Verify SAML Attributes and Claims

  • In the Azure Portal, go to the Attributes and Claims section.

  • Take a screenshot of the box.

  • Share the screenshot with your Knak admin to confirm the SAML claims are configured correctly.

    Claims configuration page.
  • Ensure the Unique User Identifier (Name ID) is set to an attribute that matches the email in Knak. In most cases this would be user.mail

    Manage claims page source attribute user.mail

Step 4: Provide the Certificate

  • In Azure, download the certificate from the third configuration box.

    • Choose the Base64 format.

      Base64 certificate download area Azure.
  • Send the certificate to your Knak admin.

  • In Knak, enter this certificate into the Public Key Certificate field in the SSO settings.

    Browse button to select certification in Knak.

Step 5: Add Identity Provider SSO URL

  • Under the Setup Knak Demo section, copy the Login URL.

    SSO URL field in Azure.
  • Paste the Login URL to the Identity Provider Single Sign On URL section in Knak.

    SSO URL field in Knak.

Note: The Single Sign On URL set here is separate from the User Access URL which you can send to Knak Support to set up a redirect to your SSO login page. More info in Step 7.

Step 6: Assign Users or Groups

  • Go to Azure Portal > Enterprise Applications > yourKnakProfile > Users and Groups.

  • Add a user or group that exists in both Azure and Knak.

    • Example: an Azure Active Directory (AAD) group named Knak_Users

Example of group assignment.

Step 7: Test the Connection

  1. In Azure, go to Enterprise Applications > yourKnakProfile > Properties.

  2. Find the User access URL.

  3. Open this URL in a browser and attempt to log in using a test account.

    • Ensure the test account has access in both Azure and Knak.

Example login page.

Note: After the support team sets up your redirect URL, users must log in successfully through your SSO provider. The login process is browser-based and sets a cookie after successful sign-in. Once users log in, they will be automatically redirected to your SSO login page in the future. The email alone will not trigger a redirect - Knak requires the full SSO authentication flow through Auth0 to enable redirection.


Need more help? Contact support via live chat using the chat bubble in the bottom right corner or email support@knak.com

Did this answer your question?