Skip to Content

Treblle Docs

SSO with Microsoft Entra ID

Note

Enterprise Feature: Single Sign-On with Microsoft Entra ID is available for Enterprise workspaces. Contact your Treblle account manager to enable SSO for your workspace.

Overview

Integrate Treblle with Microsoft Entra ID (formerly Azure Active Directory) to enable secure Single Sign-On for your team. This guide walks you through configuring SAML-based authentication between Microsoft Entra ID and Treblle.

Prerequisites

Before you begin, ensure you have:

Configuration Process

The SSO setup process involves two main steps:

  1. Configure an Enterprise Application in Microsoft Entra ID
  2. Configure SSO settings in Treblle

Part 1: Microsoft Entra ID Configuration

Step 1: Access Microsoft Entra ID Portal

  1. Navigate to the Azure Portal 
  2. Go to Microsoft Entra ID (formerly Azure Active Directory)
Microsoft Entra ID Dashboard
  1. Select Enterprise Applications from the left sidebar
Microsoft Entra ID Dashboard

Step 2: Create Enterprise Application

  1. Click + New application at the top of the Enterprise Applications page

  2. Select Create your own application

  3. In the dialog that appears:

    • Name: Enter Treblle SSO Test (or your preferred name)
    • Option: Select Integrate any other application you don’t find in the gallery (Non-gallery)
  4. Click Create

Create Enterprise Application

Tip

Application Name: Choose a descriptive name that helps your team identify this application, such as “Treblle Production” or “Treblle SSO”.

Step 3: Set Up Single Sign-On

  1. After creating the application, you’ll be redirected to the application overview page
  2. From the Getting Started section, click 2. Set up single sign on
  3. Select SAML as the single sign-on method
Setup SSO Select SAML

Step 4: Configure Basic SAML Settings

In the Basic SAML Configuration section, click Edit and configure the following:

Basic SAML Configuration

Required Fields

Field

Value

Identifier (Entity ID)

[your-organization-identifier] (e.g., acme-corp, company-sso)

Reply URL (Assertion Consumer Service URL)

[your identifier]

Note

Important: The identifier parameter in the Reply URL should match your Company Email Identifier that you’ll configure in Treblle.

Optional Fields

  • Sign on URL: Leave empty (optional)
  • Relay State: Leave empty (optional)
  • Logout URL: Leave empty (optional)

Click Save after entering the required information.

Step 5: Review Attributes & Claims

The default attributes should work correctly. Microsoft Entra ID will map these attributes:

Claim Name

Source Attribute

givenname

user.givenname

surname

user.surname

emailaddress

user.mail

name

user.userprincipalname

Unique User Identifier

user.userprincipalname

Tip

The default attribute mappings work for most organizations. Only modify these if your organization has specific requirements.

Step 6: Download SAML Certificate

In the SAML Certificates section:

  1. Locate Certificate (Base64)
  2. Click Download to save the certificate file
Download Certificate

Caution

Security: Keep this certificate file secure. You’ll need its contents to configure Treblle in the next section.

Step 7: Copy Configuration URLs

In the Set up [Your App Name] section, copy the following values:

Field

Purpose

Login URL

URL where users will be redirected to authenticate

Microsoft Entra Identifier

Your IdP Issuer URL (required for Treblle configuration)

Logout URL

URL for user logout (optional)

Note

The Microsoft Entra Identifier is the most critical value. It typically looks like: https://sts.windows.net/{tenant-id}/


Part 2: Treblle Configuration

Step 8: Access Treblle Authentication Settings

  1. Log in to your Treblle workspace as a workspace owner
  2. Navigate to SettingsAuthentication
  3. The authentication configuration page will appear

Step 9: Configure SSO in Treblle

Configure Treblle SSO

Fill in the following fields with the information from Microsoft Entra ID:

Company Email Identifier

Enter the unique identifier for your organization:

treblle-entra-id

Tip

This identifier should match the Entity ID you configured in Microsoft Entra ID. Choose a consistent naming convention across both platforms.

Authentication Type

Select SAML from the dropdown menu.

Assertion Consumer Service URL

Enter the callback URL:

[your-identifier]

Caution

Critical: Ensure the identifier parameter in this URL matches both your Company Email Identifier in Treblle and the Reply URL configured in Microsoft Entra ID.

Identity Provider Issuer

Paste the Microsoft Entra Identifier URL you copied from Azure. It should look like:

https://sts.windows.net/[your-tenant-id]/

Identity Provider Certificate

  1. Open the downloaded Certificate (Base64) file in a text editor
  2. Copy the entire contents including the header and footer:
    -----BEGIN CERTIFICATE----- [certificate content] -----END CERTIFICATE-----
  3. Paste it into the Identity Provider Certificate field in Treblle

Note

Make sure to include the BEGIN and END certificate markers. The certificate is a single continuous block of text.

Step 10: Enable SSO Login

Check the box Enable SSO Login at the bottom of the form.

This will activate SSO for your workspace once you save the configuration.

Step 11: Save Configuration

Click Save Authentication to apply your SSO settings.


Part 3: Testing SSO

Step 12: Test in Azure Portal

Test SSO in Azure

Before rolling out to your team, test the SSO configuration:

  1. Go back to your Enterprise Application in Azure Portal
  2. Navigate to Single sign-on settings
  3. Scroll to Test single sign-on with [Your App Name]
  4. Click Test sign in

Note

Important: You must assign users to the Enterprise Application before they can sign in. Go to Users and groups to add test users first.

Step 13: Verify SSO in Treblle

SSO Enabled in Treblle

After saving your configuration, you should see your SSO configuration listed in Treblle:

  • Configuration Name: treblle-entra-id
  • Status: Single Sign-On is enabled for this workspace

Part 4: User Login Flow

Step 14: Sign In with SSO

Sign In with SSO

Once SSO is configured, users can sign in via SSO:

  1. Go to https://identity.treblle.com/login 
  2. Click Sign in with SSO
  3. Enter your organization’s identifier
Enter SSO Identifier
  1. Enter your organization identifier: treblle-entra-id
  2. Click Continue
  3. You’ll be redirected to Microsoft login
  4. Authenticate with your Microsoft credentials
  5. You’ll be redirected back to Treblle and logged in

User Assignment in Microsoft Entra ID

Before users can sign in, you must assign them to the application:

  1. In Azure Portal, go to your Enterprise Application
  2. Click Users and groups from the left menu
  3. Click + Add user/group
  4. Select users or groups to grant access
  5. Click Assign

Tip

Bulk User Management: Assign Azure AD groups to the application rather than individual users for easier management at scale.


Managing SSO Configuration

Updating SSO Settings

To update your SSO configuration:

  1. In Treblle, navigate to Settings → Authentication
  2. Click Update on your SSO configuration
  3. Modify the necessary fields
  4. Click Save Authentication

Disabling SSO

To temporarily disable SSO:

  1. Go to Settings → Authentication in Treblle
  2. Uncheck Enable SSO Login
  3. Click Save Authentication

Caution

User Impact: Disabling SSO will require users to sign in with their Treblle username and password. Ensure users have their credentials before disabling SSO.

Deleting SSO Configuration

To completely remove SSO:

  1. Go to Settings → Authentication in Treblle
  2. Click Delete on your SSO configuration
  3. Confirm the deletion

Caution

Permanent Action: Deleting the SSO configuration cannot be undone. You’ll need to reconfigure from scratch if you want to re-enable SSO.


Last updated on