# User authentication with SSO

## SSO.

Many organisations may often have existing employee accounts for other services, such as Microsoft and Google.

If that is the case, TilliT can utilise them to manage TilliT users.

Commonly known as Single Sign-On (SSO), you can connect to TilliT with any service using the SAML standard.

SAML is supported by many providers including **Microsoft**, **Amazon (AWS)**, **Google** and many others.

We recommend discussing this with a member of the TilliT Support team.

Contact us to discuss using SSO.

## Azure Active Directory (Microsoft)

This guide will cover setting up TilliT with Azure Active Directory. Each tenant can now set up Single Sign-On (SSO) directly from Account Settings, allowing secure and streamlined access to the platform through your identity provider.

Click on your avatar on the top right, choose **Account**, of which then you will presented with the below UI. Click on **SSO** setup and start the SSO Setup.

You will be need the provided Entity ID and Reply URL to set this up in Azure.

<figure><img src="/files/0ng6RvN5iPOidc2RxH96" alt=""><figcaption></figcaption></figure>

Open Azure Portal <https://portal.azure.com/>, on the right side menu choose “Azure Active Directory”.

![](https://s3.amazonaws.com/helpscout.net/docs/assets/60208fd212248b2c96d50eeb/images/612f167f00c03d6720752d84/file-4jQgkDTMz5.png)

Start the process of creating a new Enterprise application. Select "non-gallery application". Give it a name (TilliT?).

Inside the newly created application, head to Single sign-on and pick SAML.

In the Identifier (Entity ID) and Reply URL, enter the data you've received from the Account page.

Save your changes, it should look like this:

![](https://s3.amazonaws.com/helpscout.net/docs/assets/60208fd212248b2c96d50eeb/images/612f16282b380503dfdecf41/file-CP8yqG9sRJ.png)

Finally, copy the App Federation Metadata URL and paste that into the second step of the setup form in TilliT DO.

<figure><img src="/files/yy4CfqQPzuxfX2iSRt9v" alt=""><figcaption></figcaption></figure>

In the next steps, the attributes are mapped with some defaults but feel free to edit them.

<figure><img src="/files/wkfy6sbZk1yQTyHWKExL" alt=""><figcaption></figcaption></figure>

Finally choose your additional configurations, it is crucial to have the provider enabled

<figure><img src="/files/pPIKiAMXIm8vVsNNsiRJ" alt=""><figcaption></figcaption></figure>

After creation your SSO Setup page will be populated with values like this.

<figure><img src="/files/DhSpDRhBfVydTxqjjQL2" alt=""><figcaption></figcaption></figure>

### Just In Time Provisioning

You can model your TilliT Groups and TilliT Roles in your Identity Provider and send them as Group claims in your SAML configuration.

{% hint style="warning" %}
**This will take precedence over any role & group assignment performed within TilliT. This means user role and group assignment is now handle by IT or those who manage your IDP.**
{% endhint %}

**Example:**

Here we have added the groups claim in to our Enterprise Application in Azure. We have modelled our Azure Groups using the “tillit-” prefix and only send those in the SAML claims.

1. Model your groups within your IDP, ensure you have created all [groups](/tillit/knowledge-base/users/groups.md) and [roles](/tillit/knowledge-base/users/permissions.md).

<figure><img src="/files/C3iIsk6RtBnwpVKa3b64" alt=""><figcaption></figcaption></figure>

2. Add the groups claim to the SSO configuration for your Enterprise Application

<figure><img src="/files/yywEV63gHtuJkMPrwBt0" alt=""><figcaption></figcaption></figure>

<figure><img src="/files/q4Oye2d8G4NtDkMwMfqI" alt=""><figcaption></figcaption></figure>

3. Contact support and send through the Group Ids like shown in step 1 for all the TilliT groups.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://help.tillit.cloud/tillit/knowledge-base/users/user-authentication.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
