MS Azure AD SAML
This feature is available to Enterprise customers.
The following manual configuration creates an SAML SSO configuration for your Enterprise organization.
- Owner role in an Enterprise organization
- Administrative access to your organization's Microsoft Azure AD portal
This configuration supports the following:
- Service provider initiated SSO
- Single Log Out [optional]
Before configuring SSO, you need to assign a namespace and download your service provider certificate in . These steps provide information you need to enter later.
Click Organization in the left sidebar.
Click the SSO tab.
Under Namespace, enter the namespace you want for your organization. For example, acme_corp. Your organization members enter this namespace when they log in via SSO.
Under SSO type, select SAML 2.0.
Copy the Redirect URL and save it in a safe place. You will use this later when you create your SAML integration in the Microsoft Azure AD portal.
Log in to the Microsoft Azure portal and navigate to the Azure Active Directory.

In the left navigation, click Enterprise applications.

Click + New Application.
Click + Create your own application.
Enter a name for your app and select Integrate any other application you don't find in the gallery.

Click Create.
In the left navigation, click Single Sign-on.

Click SAML.
Configure your Basic SAML settings using the Redirect URL (https://www.make.com/sso/saml/{namespace}) that you copied in the the steps above.
Field | Value |
---|---|
Entity ID | https://www.make.com/sso/saml/{namespace}/metadata.xml |
Reply URL | https://www.make.com/sso/saml/{namespace} |
Logout URL | https://www.make.com/sso/saml/{namespace} |

In the Attributes & Claims section, click Edit to rename your attributes.

Under Additional claims, find the value you want to edit and click that row.
Enter the new name in the Name field. Use the following chart to find the names required for your IML resolve.
Field | Value |
---|---|
user.mail | |
name | user.displayname |
id | user.userprincipalname |
Unique User Identifier | user.userprincipalname |
Click Save.
Copy the Login URL and save it in a safe place.

You need to download the base 64 SAML certificate from Microsoft Azure and upload it to the Identity Provider Certificate field of the SSO tab in your organization.
Find the SAML Certificates section of your single sign-on settings in the Microsoft Azure portal.
Next to Certificate (Base64), click Download.
Your browser automatically downloads the .cer file.
Click Organization in the left sidebar.
Click the SSO tab.
Under Identity Provider Certificate, click Extract. A pop-up appears.
Under P12, PFX or PEM file, click Choose file and select the .cer file you downloaded.
Enter the following information from MS Azure into the IdP login URL and Identify provider certificate fields.
Field | Value to enter from MS Azure |
---|---|
IdP login URL | Login URL |
Identity provider certificate | Certificate (Base 64) |
Enter the following in the Login IML resolve field:
Select the following settings:
Field | Value |
---|---|
Allow Unencrypted Assertions | Yes |
Allow Unsigned Responses | No |
Sign Requests | Yes |

Click Save.
You will receive an email with the subject "Activation complete: SSO ready for your organization" upon successful activation. If you encounter any issues while logging in using SSO, disable SSO using the "one-time link" (valid for 24 hours).
Go to make.com.
Click Sign in with SSO.
Enter the namespace you chose for your organization.
Log in using your Microsoft credentials and consent to 's access to your user data.