Setting up SSO with Juristic
We offer a self-service option to make it easy for you to connect your organisation’s Azure Active Directory (Azure AD / Entra ID) with our platform through Auth0. To get started, you’ll need to request a setup link from us.
⚠️ Before you request the link, please ensure you have the following details ready. Having these prepared will make the process faster and smoother.
💡 The following guide is on setting up Juristic with Entra ID. If you use a different vendor, please contact your Juristic guide. We support all major providers.
What you’ll need from Azure AD
When setting up SSO, Azure AD requires that you provide three key pieces of information from your app registration:
Application (Client) ID
-
Where to find it: Azure Portal → Entra ID → App registrations → Your app → Overview.
-
This is a unique identifier for your registered application.
Client Secret Value
-
Where to find it:
Azure Portal → App registrations → Your app → Certificates & secrets → New client secret → copy the Value immediately after creation.
-
Important: make sure to copy the secret value, not the “secret ID”. The value is shown only once, at creation.
Environment URL
-
This is the identifier for your Azure AD tenant.
-
Example format: tenant.onmicrosoft.com, or yourDomain.com
Steps to complete the setup
-
Request a setup link from our team.
-
Open the link – you’ll be guided through the configuration process.
-
Enter the three details listed above (Client ID, Client Secret Value, Issuer URL).
-
Save and test the connection. We recommend testing with at least one user account before rolling it out company-wide.
Tips to avoid common issues
-
Ensure you copy the Client Secret Value (not the Secret ID).
-
If your organisation uses conditional access policies, make sure the app registration is granted the correct permissions in Azure AD.