﻿---
title: Register Elastic Cloud SAML in Microsoft Entra ID
description: To configure Elastic Cloud SAML SSO with Microsoft Entra ID (formerly Azure AD) as the identity provider (IdP), perform the following steps. In Microsoft...
url: https://www.elastic.co/elastic/docs-builder/docs/3016/deploy-manage/users-roles/cloud-organization/register-elastic-cloud-saml-in-microsoft-entra-id
products:
  - Elastic Cloud Hosted
applies_to:
  - Elastic Cloud Serverless: Generally available
  - Elastic Cloud Hosted: Generally available
---

# Register Elastic Cloud SAML in Microsoft Entra ID
To [configure Elastic Cloud SAML SSO](https://www.elastic.co/elastic/docs-builder/docs/3016/deploy-manage/users-roles/cloud-organization/configure-saml-authentication) with Microsoft Entra ID (formerly Azure AD) as the identity provider (IdP), perform the following steps.

## Create a new Entra ID Enterprise application

In Microsoft Entra ID, create a new Entra ID Enterprise application.
1. From the Microsoft Entra Gallery, create a non-gallery application.
2. Provide a name and basic information about the application.
3. In the **Single sign-on** section, select **SAML** as the single sign-on method.
4. In the basic SAML configuration, enter placeholder values for the entity ID and the reply or assertion consumer service (ACS) URL.
5. In the **Attributes & Claims** section, configure claims:
   1. Configure a claim named `email` to send the email address of your users. This attribute is required in the SAML response.
2. Optional: Configure a `firstName` and `lastName` claim to set the Elastic Cloud user’s name during SSO.
3. Optional: If you plan to use [role mappings](/elastic/docs-builder/docs/3016/deploy-manage/users-roles/cloud-organization/configure-saml-authentication#role-mappings) to automate role assignments, add a group claim and customize which groups are sent. Make sure that you customize the name of the group claim under the **Advanced options** section to set the groups claim attribute name `groups`.
6. Collect information about the application from the Entra ID screen.
   1. Get the **Login URL** for the SSO URL, which is the URL where users will be redirected at login.
2. Get the **Microsoft Entra Identifier** for use as the issuer.
3. From the **SAML Certificates** section, download the Base64 signing certificate.


## Register with Elastic Cloud

[Register the IdP with Elastic Cloud](/elastic/docs-builder/docs/3016/deploy-manage/users-roles/cloud-organization/configure-saml-authentication#ec-saml-sso-register-idp).
1. Open your organization’s [**Security**](https://cloud.elastic.co/account/idp) tab.
2. In the **User authentication** section, click **Configure SSO**.
3. Fill the following fields:
   1. **Identity Provider Entity ID**: Enter the **Microsoft Entra Identifier** that you collected in the previous step.
2. **Identity Provider SSO URL**: Enter the **Login URL** that you collected in the previous step. Users will be redirected to this URL when they attempt to log in.
3. **Public x509 certificate**: Paste the contents of the downloaded signing certificate.
4. **Login identifier prefix**: A customizable piece of the Elastic Cloud SSO URL that your organization members can use to authenticate. This could be the name of your business. You can use lowercase alphanumeric characters and hyphens in this value, and you can change it later.
4. Click **Update configuration**.

If successful, the API will return additional details that will need to be provided to the IdP.

## Update the Entra ID Enterprise application

Update the **Basic SAML Configuration** section of the Entra ID Enterprise application to use the values returned in the **User authentication** page.
1. Set the entity ID to the **Service provider Entity ID** value.
2. Set the reply or ACS URL to the **Service provider ACS URL** value.
3. Set the sign on URL to the **SSO Login URL** value.
4. Optional: Fill in other details using information from the metadata file available at the **metadata URL**.

When these steps are complete, you should be able to test SSO as described in [Configure Elastic Cloud SAML SSO](https://www.elastic.co/elastic/docs-builder/docs/3016/deploy-manage/users-roles/cloud-organization/configure-saml-authentication).