Documentation

How to setup SAML authentication with Microsoft Entra

Authentication
Updated Jan 11, 2026

Why Businesses Should Use SAML

As businesses grow, managing user access across multiple systems becomes increasingly complex. Employees need to log in to dozens of tools, from email and collaboration platforms to specialized business apps like ChangeBreeze and each login means another password to remember, reset, and secure.

That’s where SAML (Security Assertion Markup Language) comes in. SAML allows businesses to connect their internal identity systems (like Azure AD, Okta, or Google Workspace) directly to their cloud applications, providing Single Sign-On (SSO) capabilities.

With SAML in place:

  • Users log in once with their corporate credentials and gain access to all approved apps.
  • IT teams maintain centralized control over authentication and access.
  • Security improves because credentials are never stored or managed in multiple systems.
  • Onboarding and offboarding are streamlined, access follows the user’s corporate identity.

Setting up Entra Enterprise Application

  1. Login to https://portal.azure.com/ and choose Enterprise applicaitons.
  2. Select New application
  3. Select Create your own application, give it a name such as "ChangeBreeze SSO" and leave the option checked Integrate any other application you don't find in the gallery (Non-gallery).
  4. Select Single Sign-on from the side menu, then select SAML as the single sign on method.
  5. From here we need to setup the Single Sign on Settings.
    (We need to configure a temporary "ID" here and update these URLs in a later step)

    Identifier (Entity ID): https://changebreeze.com/sso/metadata/ID
    Reply URL (Assertion Consumer Service URL): https://changebreeze.com/sso/acs/ID
    Logout Url (Optional): https://changebreeze.com/sso/sls/ID

    Once configured select save
  6. Download the Base 64 Certificate which will be uploaded to ChangeBreeze.
  7. Login to https://changebreeze.com/ with your admin account, navigate to Orginization Settings or Company Settings depending on your account type.

    Organization Account: https://changebreeze.com/organisation/sso/
    Tenant Account (Org Customers): https://changebreeze.com/company/sso/

    Then select Add Provider


    Fill in the following settings:
    Provier Name: This can be any name that makes sense example "Entra SSO"
    Provider Type: Azure AD / Entra ID
    Domain: This domain field is used during SAML sign on use you company domain example changebreeze.com
    Identity Provider Entity ID: This will be the Microsoft Entra Identifier URL
    Single Sign-On URL: This is the Login URL
    Single Logout URL: This is the Logout URL
    Example:

    X.509 Certificate: The Base64 Certificate that was downloaded earlier needs to be uploaded to changebreeze.com.

    Open the certificate in a plain-text editor
    Windows: Right-click → Open with → Notepad, Notepad++ (better), or VS Code.
    macOS: Use TextEdit in plain text mode (Format → Make Plain Text) or VS Code.
    Linux: Use nano certificate.pem, vim certificate.pem, or a GUI editor like Gedit.

    Do not open in Word or any rich-text editor (they add hidden formatting).

    Copy the entire contents including the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- sections.
    Paste it into the X.509 field:
  8. Select Create Provider

  9. Scroll to the bottom of the page to see the Service Provider SP Configuration section. These settings now need to be updated in Entra with the provided URL settings:

    Identifier (Entity ID): https://changebreeze.com/sso/metadata/<YOURID>
    Reply URL (Assertion Consumer Service URL): https://changebreeze.com/sso/acs/<YOURID>
    Logout Url (Optional): https://changebreeze.com/sso/sls/<YOURID>


    The Entra SAML settings should now be matching as per:


  10.  SAML authentication is now complete. 

  11. To sign in, browse to http://changebreeze.com/accounts/login/ Select Sign in with SAML SSO at the bottom of the screen.
  12. Enter your company domain as per step 7, then select Continue with SAML. If you are already signed in, you should immediately be logged in and account created, if not you will be redirected to sign in with Microsoft.

 

Related Articles

Authentication

Account Permissions

ChangeBreeze's role-based permission system provides: Flexibility: Six distinct roles to match your organizational structure Security: Separation of duties and principle of least privilege ITIL Compliance: Roles aligned with ITIL change management best practices Scalability: Works for small teams and large MSPs alike Auditability: Complete logging of all permission-based actions

Authentication

Enforcing Multi-Factor Authentication for All Users

Enforcing MFA protects your organization by adding a layer of security beyond passwords. Admins can enable it in ChangeBreeze’s Organization settings. SAML-authenticated users may already have MFA via their identity provider and can be excluded from additional enforcement.

Authentication

How to enable MFA for local accounts

Steps to Enable Multi-Factor Authentication (MFA) for Enhanced Account Security

Authentication

Managing Global User Permissions for Organizational Accounts

In a multitenant system with organizational user accounts, permissions are global and apply to all sub-companies within the organization. Any permissions set at the organizational level automatically cascade to the sub-companies. User accounts can have roles set during their creation, with the option to edit these roles later from the User Management page. Editing a user's role will update their role across all companies within the organization, override any custom role settings at the company level, and take effect immediately.

Authentication

Managing Global User Permissions for Sub Company / Tenant Accounts

In a multitenant system, sub-company accounts can have user accounts directly attached, typically for customer end users. Permissions can be tailored for these users, such as in the case of an IT team for a sub-customer.