Before You Begin
Make sure you have:
Admin access to both Knak and Azure
A test user configured in both systems
Video for Azure SSO Set Up Guidance
Step 1: Configure SSO in Knak
Copy the following values:
Single Sign-On URL
Example:
https://knak.auth0.com/login/callback?connection=myCompanyAudience URI
Example:
urn:auth0:knak:myCompany
Step 2: Set Up SAML Configuration in Azure
Go to Azure Portal > Enterprise Applications.
Create your Knak application.
Select Add > Enterprise Application > Create your own Application.
Input Knak as the application name.
Select Integrate any other application you don’t find in the gallery (non gallery)
Press Create.
Navigate to Single Sign-on > SAML-based Sign-On
Enter the values from Knak:
Paste the Single Sign-On URL into the Reply URL (Assertion Consumer Service URL) field.
Paste the Audience URI into the Identifier (Entity ID) field.
Note: Do not populate the Sign on URL (Optional) field.
Step 3: Verify SAML Attributes and Claims
In the Azure Portal, go to the Attributes and Claims section.
Take a screenshot of the box.
Share the screenshot with your Knak admin to confirm the SAML claims are configured correctly.
Ensure the Unique User Identifier (Name ID) is set to an attribute that matches the email in Knak. In most cases this would be
user.mail
Step 4: Provide the Certificate
In Azure, download the certificate from the third configuration box.
Send the certificate to your Knak admin.
In Knak, enter this certificate into the Public Key Certificate field in the SSO settings.
Step 5: Add Identity Provider SSO URL
Under the Setup Knak Demo section, copy the Login URL.
Paste the Login URL to the Identity Provider Single Sign On URL section in Knak.
Note: The Single Sign On URL set here is separate from the User Access URL which you can send to Knak Support to set up a redirect to your SSO login page. More info in Step 7.
Step 6: Assign Users or Groups
Go to Azure Portal > Enterprise Applications > yourKnakProfile > Users and Groups.
Add a user or group that exists in both Azure and Knak.
Example: an Azure Active Directory (AAD) group named
Knak_Users
Step 7: Test the Connection
In Azure, go to Enterprise Applications > yourKnakProfile > Properties.
Find the User access URL.
The link should have the following syntax: https://launcher.myapps.microsoft.com
Open this URL in a browser and attempt to log in using a test account.
Ensure the test account has access in both Azure and Knak.
Note: After the support team sets up your redirect URL, users must log in successfully through your SSO provider. The login process is browser-based and sets a cookie after successful sign-in. Once users log in, they will be automatically redirected to your SSO login page in the future. The email alone will not trigger a redirect - Knak requires the full SSO authentication flow through Auth0 to enable redirection.
Need more help? Contact support via live chat using the chat bubble in the bottom right corner or email support@knak.com










