Entra ID labels and menus change over time. If a step does not match your portal exactly, search for Enterprise applications and Single sign-on within Microsoft Entra admin center.
Values you copy from Planasonix
From Settings → Security → SSO in Planasonix, copy:- Identifier (Entity ID) — Azure calls this Identifier in basic SAML configuration.
- Reply URL (Assertion Consumer Service URL) — Azure calls this Reply URL.
Create and configure the enterprise application
Create the enterprise application
In Microsoft Entra admin center, go to Identity → Applications → Enterprise applications → New application → Create your own application. Name it (for example,
Planasonix), choose Integrate any other application you don’t find in the gallery, and create the app.Set Identifier and Reply URL
Under Basic SAML Configuration, click Edit:
- Identifier (Entity ID): paste the Planasonix Entity ID exactly. If Azure allows multiple values, keep a single entry unless your Planasonix admin gives you alternates.
- Reply URL (Assertion Consumer Service URL): paste the Planasonix ACS URL exactly.
Identifier and reply URL: trailing slashes
Azure AD compares Identifier and Reply URL strings literally. A trailing slash on the Planasonix Entity ID or ACS URL must match character-for-character in Entra ID.User and group assignment
Under Enterprise application → Users and groups, assign users or groups who may sign in. Unassigned users cannot start SSO even if the SAML configuration is correct.Group claims for Planasonix
If Planasonix maps groups to roles or projects:Configure optional claims
In the enterprise app, open Single sign-on → Attributes & Claims → Edit. Add a groups claim (or the claim name Planasonix documents) so the token includes security groups or Groups assigned to the application, depending on your design.
Conditional Access
Conditional Access
Apply Conditional Access policies to the Planasonix enterprise application to require compliant devices, MFA at the IdP, or named locations. Test policies with a pilot group before broad rollout. Failed CA shows as access denied at Microsoft before Planasonix receives an assertion.
Certificate renewal
Certificate renewal
When Entra ID rotates signing certificates, upload the new metadata or certificate in Planasonix before the old cert expires. Coordinate with your Planasonix admin if you use automatic rollover versus manual uploads.
Finish in Planasonix
Upload the Federation Metadata XML or paste SSO URL, issuer, and signing certificate into Planasonix. Validate sign-in, then enable Require SSO when your change window allows.Related topics
SSO overview
End-to-end SAML setup and certificate rotation.
MFA
Layering step-up auth with IdP policies.