Dovetail supports SAML 2.0 SSO with any compatible identity provider. Admins on Enterprise and Business plans can require users to authenticate via SAML or OpenID Connect. This guide covers how to set up a SAML SSO connection, including generating connection values in Dovetail, configuring your identity provider, and testing attribute mappings before going live.Documentation Index
Fetch the complete documentation index at: https://docs.dovetail.com/llms.txt
Use this file to discover all available pages before exploring further.
Set up SAML with Microsoft Entra ID
This setup requires Admin access in both Dovetail and Entra. You’ll switch between both tabs throughout, so keep them open until you’re done.Step 1: Start the connection in Dovetail
- In Dovetail, go to Settings > Authentication.
- Under Authentication connections, select Create Enterprise SSO connection.
- Choose Custom SAML and select Continue.
- Optionally update the connection’s display Label and the Button message shown to users on the sign-in screen, then select Continue.
- A new tab will open with the SAML setup wizard. Select Get started, choose Custom SAML, and select Next.
- Copy the Single sign-on URL and Service provider entity ID shown on screen. You’ll need these in the next step. Keep this tab open.
Step 2: Create the application in Microsoft Entra ID
- In the Microsoft Entra admin center, go to Enterprise applications and select New application.
- Select Create your own application.
- Enter a name (for example,
Dovetail SAML), choose Integrate any other application you don’t find in the gallery (Non-gallery), and select Create.Note: There is a Dovetail app in the Entra gallery, but it uses OIDC. To use SAML, create your own application as described above.
- Once the application is created, go to Single sign-on and select SAML.
- In the Basic SAML Configuration section, select Edit.
- Select Add reply URL and paste the Single sign-on URL you copied from Dovetail.
- Select Add identifier and paste the Service provider entity ID you copied from Dovetail.
- Select Save, then close the Basic SAML Configuration panel.
- In the SAML Certificates section, copy the App Federation Metadata URL.
Step 3: Finish setup in Dovetail
- Return to the Dovetail SAML setup tab.
- Paste the App Federation Metadata URL into the Metadata URL field.
- Select Create connection, then select Proceed.
- Dovetail will display the required attributes (
emailandname). Select Next to continue to the connection test.
Step 4: Test and enable the connection
- Select Test connection. A new window will open prompting you to sign in via Entra.
- Once sign-in completes, return to the SAML setup tab. You’ll see Testing complete along with the attribute values returned by Entra.
- Confirm that both email and name are mapped to the expected values. If something looks off—for example, name mapping to an email address or user principal name—update the attribute mappings in Entra under Single sign-on > Attributes & Claims and re-test. See Troubleshooting attribute mappings below.
- Once the test results look correct, select Enable connection, then Proceed. SAML SSO is now live.
Troubleshooting attribute mappings in Entra
By default, Entra maps the name attribute touser.userprincipalname, which is often the user’s email address rather than their display name. If the connection test shows name mapping to an unexpected value, update the mapping:
- In your Entra application, go to Single Sign-On> Attributes & Claims and select Edit.
- Delete the existing name claim and add a new claim called
name. - Map the new claim to
user.displayname, or use a transformation (such as Join withuser.givennameanduser.surname) if your users don’t have a display name set. - Save your changes and re-run Test connection in Dovetail.