Register now: How design teams use AI to prototype

Announcing Visual Copilot - Figma to production in half the time

Builder.io
Builder.io
Contact sales

Register now: How design teams use AI to prototype

Announcing Visual Copilot - Figma to production in half the time

enterprise plans

There are two main steps to setting up SSO with Builder and Microsoft Entra ID (formerly known as Azure AD).

  1. Configuring Entra by creating an application integration.
  2. Configuring Builder by adding an Entra SAML Config.

Note that if you're using OIDC, you can leverage Code Flow. For details, read Using Code Flow with SSO.

Begin by creating a new application:

  1. Go to the Microsoft Entra (formerly Azure) Portal.
  2. In your account, select Enterprise Applications.
  3. Click New Application.
  4. Click Create your own application. A dialogue opens where you can enter the name of your application. Keep the default selected option, which is Integrate any other application you don’t find in the gallery (Non-gallery).

After you create your application:

  1. Click the Get started link for setting up single sign on. Alternatively, click Single sign-on within the Manage dropdown menu.
  2. Select SAML as the single sign-on method.
  3. Click Edit next to the Basic SAML Configuration.

Enter the following values within the Basic SAML configuration. Keep in mind the value you choose for {your-sso-name}, as you will need it in the following step.

FieldValue

Identifier

https://builder.io

Reply URL

https://builder.io/__/auth/handler

Sign on URL

https://builder.io/login/saml/{your-sso-name}

Fill other optional values as needed.

Next, download the certificate using the Download link from the SAML Certificates section next to Certificate (Base64), as shown below:

Screenshot of SAML Certificates in Azure. items include the Status, thumbprint, Expiration, Notification Email, App Federation Metadata URL. After these are three links for downloading the Certificates. After the download links is a section entitled "Verification certificates (optional)" where Required is set to No and Active and Expired are both set to zero.

Finally, scroll down the Single sign-on page until you reach the 4th step, titled titled Set up {your-sso-name}.

Screenshot of info to get from Azure that you'll need to provide in the Builder config.

These values will be used in providing configuration to Builder.

To add your SSO details to your Builder account:

  1. Go to your Builder Organization page.
  2. Click the Edit button next to Single Sign-on.
  3. Choose the following values within the form field provided.
FieldValue

SSO Method

SAML

Display Name

Choose a name to display to users for this SSO.

SSO Name

saml.{your-sso-name}; the name inputted here must match the value you provided to Entra.

IdP entity ID

Copy the Microsoft Entra Identifier from Entra's Single sign-on Set up section, as described previously.

Service provider host

https://builder.io

SSO URL

Copy the Login URL from Entra's Single sign-on Set up section, as described previously.

X.509 certificate

Copy the text from the certificate you downloaded previously. Paste the contents of the certificate here.

Default Role

Choose the default role for users who sign up with this single sign-on process. To learn more, visit the Manage users doc.

By default, usernames are not mapped between Builder and identity providers. However, administrators can establish this connection by mapping a specific name field from the identity provider to the name attribute in Builder's profile settings. This configuration ensures that the username is properly set upon user login with SSO.

To map usernames between Builder and Microsoft Entra, you'll need to go to Entra to update your profile mappings.

Was this article helpful?

Product

Visual CMS

Theme Studio for Shopify

Sign up

Login

Featured Integrations

React

Angular

Next.js

Gatsby

Get In Touch

Chat With Us

Twitter

Linkedin

Careers

© 2020 Builder.io, Inc.

Security

Privacy Policy

Terms of Service

Get the latest from Builder.io

By submitting, you agree to our Privacy Policy

  • Fusion

  • Publish

  • Product Updates

  • Figma to Code Guide

  • Headless CMS Guide

  • Headless Commerce Guide

  • Composable DXP Guide

Security

Privacy Policy

SaaS Terms

Compliance

Cookie Preferences