Microsoft Entra (Azure AD) as a SAML Identity Provider
To configure Microsoft Entra ID (formerly Azure Active Directory) as a SAML 2.0 external integration, you must register a new application within the Microsoft Entra portal. This registration establishes trust between Microsoft Entra and the Conga Revenue Lifecycle Platform, enabling secure single sign-on (SSO) through SAML.
During the setup process, Microsoft Entra acts as the Identity Provider (IdP), while Conga Advantage Platform functions as the Service Provider (SP). The Conga Advantage Platform also supports IdP-initiated flow.
Once the application is created, you must collect such key configuration values as the Tenant ID, Metadata URL, and the claim type used to represent the user's organization ID to complete integration to the Conga platform.
This setup allows users to authenticate through Microsoft Entra using their enterprise credentials, ensuring secure and centralized identity management for access to Conga services.
Step 1: Register an app in Microsoft Entra (Azure AD)
Step 2: Get the Tenant ID, Metadata Location URL, and Organization ID Claim Type details
Step 3: Add Microsoft Entra (Azure AD) as an external integration
Review the step 4 if you want to configure the Single Sign-On (IdP-initiated flow).
-
Click the More (
) icon and select Edit.
-
Update the Choose IDP Metadata Setup, External Organization ID, Type, Organization ID Claim Type, Description, Email Domain, Display Name, and Default IDP fields per your business needs.
Note: You should change the External Organization ID if the Single Sign-On (SSO) external ID changes.