<span id="top"></span>
Configuring Microsoft Entra ID (Azure AD) SSO
This guide outlines the steps to configure Single Sign-On (SSO) with Microsoft Entra ID (Azure AD) for Qualified. Follow these instructions to streamline authentication for your users and enhance security.
- Prerequisites
- Steps to Configure Microsoft Entra ID SSO
- Enable SCIM Provisioning (Optional)
- Binding Email Process for Existing Users
- Adding New Users
- Disconnecting SSO
<span id="prerequisites"></span>
Prerequisites
- A Microsoft Entra subscription and at least the Cloud Application Administrator role.
- Access to Qualified’s Enterprise Single Sign-On and the Admin user role.
- Your organization’s Company ID from Qualified.
- A basic understanding of SAML 2.0 configuration.
<span id="steps-to-configure"></span>
Steps to Configure Microsoft Entra ID SSO
Step 1: Set up in Qualified
- Log in to your Qualified Admin account.
- Navigate to Settings → Organization → Single Sign-On.
- Select Azure AD (SAML 2.0) from the dropdown menu.
- Copy your Company ID.

- Create your SAML Assertion Consumer Service (ACS) URL and store it somewhere temporarily to be used in a later step below:
https://app.qualified.com/auth/saml/[PASTE_YOUR_COMPANY_ID_HERE]
Step 2: Configure in Microsoft Entra
- Sign in to the Microsoft Entra admin center with at least a Cloud Application Administrator role.
- Create a new enterprise app for Qualified
- Navigate to Identity → Applications → Enterprise applications.
- Select New application and click Create your own application.
- Name the app “Qualified”, select Integrate any other application you don’t find in the gallery (Non-gallery), then click Create.
- Once created, use the image below for the app’s logo:

- Assign yourself as a user for the application.
- Configure Single Sign-On:
- Select SAML as the SSO method.
- In Basic SAML Configuration, enter
- Identifier (Entity ID): https://app.qualified.com
- Reply URL (ACS URL): Your custom SAML ACS URL with the Company ID from Qualified:
https://app.qualified.com/auth/saml/[PASTE_YOUR_COMPANY_ID_HERE]
- Save your configuration.
- Configure Attributes & Claims:
- Delete default attributes except Unique User Identifier (Name ID).
- Add new claims:
- first_name: user.givenname
- last_name: user.surname
- saml_id: user.objectid

- Save your configuration.
- Under SAML Signing Certificate, copy the App Federation Metadata URL.
Microsoft Entra documentation: Add an Enterprise Application & Create your own Application.
Step 3: Finalize SSO in Qualified
- Return to Settings → Organization → Single Sign-On in Qualified.
- Paste the App Federation Metadata URL into the required field.
- Click Save and then Verify Configuration to test the connection.
- If you encounter issues during verification, such as a failed connection or mismatch errors, double-check that the metadata URL matches exactly with the one provided in Microsoft Entra.
- Assign all existing Qualified users access to the new Qualified application in Microsoft Entra before enabling SSO (See: Binding Email Process for Existing Users)
- When ready, click Enable single sign-on for this org.
<span id="enable-scim-provisioning"></span>
Enable SCIM Provisioning (Optional)
SCIM provisioning automates user creation, updates, and deactivation directly from Microsoft Entra. This step is optional but highly recommended for efficient user management.
Supported Provisioning Features
The following provisioning features are supported within Qualified provisioning of SSO users:
- Push New Users: New users created through Microsoft Entra ID will also be created in the third-party application.
- When a user is provisioned, their name, role, phone number, email, and timezone from Azure are synced to Qualified. Further updates are limited to email and role changes only.
- Push Profile Updates: Updates made to a user's email or role in Microsoft Entra are pushed to Qualified.
- Push User Deactivation: Deactivating a user or disabling their access to the Qualified application in Microsoft Entra will deactivate the user in Qualified.
- Deactivation removes login access but retains the user's information in Qualified as inactive.
- Reactivate Users: User accounts can be reactivated in Qualified via Microsoft Entra ID.
Unsupported Provisioning Features
The following features are not supported:
- Import Users
- Import/Push Groups
- Sync Password
- Profile Sourcing
Steps to Enable SCIM Provisioning
Step 1: In Microsoft Entra, create App Roles for the Qualified application:
- Sign in to the Microsoft Entra admin center.
- Navigate to Identity → Applications → App registrations and select the Qualified application.
- Under Manage, select App roles and then click Create app role.

- In the Create app role pane, configure the following roles:
- Display Name: Qualified Admin, Qualified Rep, Qualified Meetings
- Allowed Member Types: Users/Groups
- Value: admin, rep, meetings (case sensitive)
- Description: Describe each role's function, e.g., "Qualified Admins have full access," "Reps engage in chat," etc.
- Ensure the app role is enabled and click Apply.
Microsoft Entra documentation: Add App Roles to your Application
Step 2: In Qualified, collect your API URL and Bearer Token:
- Go to Settings → Organization → Single Sign-On.
- Toggle on SCIM Enabled.
- Copy the API URL and Bearer Token.

Step 3: In Microsoft Entra, complete SCIM Provisioning set up:
- Return to the Microsoft Entra admin center.
- Navigate to the Enterprise Applications section and select your Qualified app.
- Open the Provisioning tab.
- Under Admin Credentials, paste the API URL and Bearer Token from Qualified.
- Click Test Connection to verify the integration.
- Expand Mappings, and select Provision Microsoft Entra ID Users to edit the user attribute mappings.
- Make sure the customappsso Attribute and Microsoft Entra ID Attribute exactly match the following:
- Disable Provision Microsoft Entra ID Group mappings. Qualified does not support Group mappings at this time.
- Save your settings and enable Provisioning.
Microsoft Entra documentation: Configure Automatic User Provisioning & Editing User Attribute Mappings
Step 4: Testing and Verification
- Add a test user in Microsoft Entra ID and verify:
- The user is created in Qualified with the correct attributes and role.
- Profile updates (email and role) sync correctly.
- Deactivating the user removes access in Qualified.
<span id="binding-email-process"></span>
Binding Email Process for Existing Users
After enabling SSO, all existing Qualified users receive an email from app@qualified.com with a unique binding link.

Users must click the link within 72 hours to bind their Qualified account to their Microsoft Account. If the binding link expires, an admin can resend it from Settings → Organization → Users.

<span id="adding-new-users"></span>
Adding New Users
With SCIM Provisioning Enabled
A Microsoft Entra user with at least a Cloud Application Administrator role will need to assign the user to the Qualified application.
Microsoft Entra documentation: Assign Users and Groups to an Application
Without SCIM Provisioning
If your company does not have SCIM Provisioning enabled, then you’ll follow the steps below to add new users to Qualified:
- Assign Users in Microsoft Entra: A Microsoft Entra user with at least a Cloud Application Administrator role will need to assign the user to the Qualified application: Assign Users and Groups to an Application
- Invite Users in Qualified: Invite users from Settings → Organization → Users in Qualified: Provisioning Users in Qualified
- User Accepts Invite: Invited users will receive an email with a button to link their account and access Qualified.
<span id="disconnecting-sso"></span>
Disconnecting SSO
If you'd like to disconnect your company’s SSO, you can do so at any time.
- Go to Settings → Organization → Single Sign-On
- Click Disable SSO for this Team.
- Users will receive an email to create a new password and log in using their email addresses.

Heading 1
Heading 2
Heading 3
Heading 4
Heading 5
Heading 6
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Block quote
Ordered list
- Item 1
- asdfasdf
- asdfasdf
- asdfasdf
- Item 2
- Item 3
Unordered list
- Item A
- Item B
- Item C
Bold text
Emphasis
Superscript
Subscript
|
---|
|