Skip to main content
This guide explains how to configure SAML 2.0 Single Sign-On (SSO) between Microsoft Entra ID and the Resistant Documents Web UI.
Web UI SSO is for human users accessing the hosted UI and is separate from Documents API authentication.

What you’ll set up

You will create a non-gallery Enterprise Application in Microsoft Entra ID and configure it for SP-initiated SAML SSO to the Resistant Documents Web UI. At the end you will have:
  • SAML SSO working end-to-end (login redirect → assertion → Web UI session)
  • Required user claims mapped (email, firstName, lastName)
  • Optional role mapping via documents_roles (if used)

Prerequisites

Before you begin, ensure you have:
  • An active Resistant AI subscription / tenant
  • An active Microsoft Entra ID tenant
  • An Entra administrator account that can create Enterprise Applications
This usually requires one of:
  • Cloud Application Administrator
  • Application Administrator
  • Global Administrator

Testing vs Production

Testing and production Web UI tenants are separate.
  • You typically configure two Enterprise Applications in Entra: one for Testing and one for Production
  • Users must be assigned separately for each environment
  • Resistant AI will provide environment-specific Entity ID and ACS (Reply URL) values

Step 1 — Request configuration values from Resistant AI

Ask Resistant AI to provide the SAML configuration values required for your environment(s). These typically include:
  • Identifier (Entity ID / Audience URI)
  • Reply URL (ACS URL)
  • Sign-on URL (your Web UI entry URL)
  • (Optional) SP metadata XML (recommended for import)

  1. Sign in to the Azure portal and open Microsoft Entra ID.
  2. Go to Enterprise applicationsNew application.
  3. Select Create your own application.
  4. Enter an application name (example: Resistant AI Document Forensics).
  5. Select Integrate any other application you don’t find in the gallery (Non-gallery).
    Image

Step 3 — Configure basic SAML settings

In the new enterprise application:
  1. Open Overview and select Set up single sign on, or go to Manage > Single sign-on.
    Image
  2. Select SAML as the single sign-on method.
    Image
  3. Import the key SAML parameters from the metadata XML file provided by Resistant AI:
    • Select Upload metadata file
    • Choose the Metadata XML file
    • Select Add
      Image
  4. Review the prefilled values in Basic SAML Configuration:
    • Confirm that Identifier and Reply URL match the values provided by Resistant AI
    • Enter the Sign-on URL using your Resistant AI Document Forensics UI URL
    • Select Save, then close the dialog
      Image
  5. If Microsoft Entra ID offers to test the SSO integration at this stage, select No, I’ll test later.
    Image

Step 4 — Configure attributes and claims

Microsoft Entra ID must send the required user profile attributes with each successful SSO login.
Required?Claim nameSource attributeData typeNamespaceName format
yesemailuser.mailstringemptyOmitted (default)
yesfirstNameuser.givennamestringemptyOmitted (default)
yeslastNameuser.surnamestringemptyOmitted (default)
nodocuments_rolesvariesarray of stringsemptyOmitted (default)
  1. In Attributes & Claims, update the default claims so they match the table above. For each required claim:
    • Set Name to the claim name shown in the table, for example email
    • Clear the Namespace field
    • Set Name format to Omitted (default)
    • Set Source to Attribute
    • Select the correct Source attribute, for example user.mail After the changes, the Additional claims section should look similar to the example below:
    Image
  2. Optionally, add a claim named documents_roles to control which customer tenant the user can access and which role should be assigned in the Resistant AI platform. Each value should combine:
    • A tenant identifier, preferably the tenant ID provided by Resistant AI
    • A separator, for example _
    • A user role code Supported role codes:
    • RW = Read-Write
    • RO = Read-Only Example documents_roles values:
    • "documents_roles": ["tenant1_RW"]
    • "documents_roles": ["tenant1_RO", "tenant2_RW"]
    • "documents_roles": ["29Z73Z5p2ECTsEdCzGA0AlpiaXQ_RW", "2w5buuFoVCn9dySYnsqedMkVI8N_RW", "29Z74Z5p2ADTsEdCyGA1AlpiaXQ_RW"]
  3. After you complete this step, your Microsoft Entra ID configuration is ready. Resistant AI can complete the remaining configuration on the service provider side after receiving your identity provider metadata.

Step 5 — Send Microsoft Entra ID metadata to Resistant AI

On the SAML-based Sign-on page, in the SAML Certificates section:
  1. Download the Federation Metadata XML file.
  2. Send the file to Resistant AI.
    Image
Note: This file contains identity provider metadata, including identifiers and the public signing certificate. Handle it according to your organization’s standard security practices.

Step 6 — Wait for Resistant AI to complete the configuration

Resistant AI will finalize the Service Provider configuration and confirm when the integration is ready for testing.

Step 7 — Test the SSO integration

Before testing:
  • Assign a test user in Microsoft Entra ID to the new enterprise application.
  • Make sure the test user can access the following URLs from a web browser:
    • Your Microsoft Entra ID sign-in page, for example https://login.microsoftonline.com/...
    • Your Resistant AI Document Forensics Web UI URL, for example https://<NAME>.documents.resistant.ai
    • Resistant AI Identity and Access Management (IAM) URL: https://eu.id.resistant.ai
Note: Full Web UI functionality may also require access to additional backend endpoints. These can vary by customer deployment. To test the SSO flow, use one of the following methods:
  1. Ask the test user to open the Resistant AI Document Forensics UI URL in a browser and confirm that:
    • the user is redirected to Microsoft Entra ID for authentication
    • after sign-in, the user is redirected back to the Resistant AI application successfully
  2. If the test user is also an administrator with access to this SSO configuration, use the built-in test function on the SAML-based Sign-on page.
    Image
SSO messages pass through the user’s browser. Browser developer tools and a SAML tracer are usually the fastest way to debug.

Notes and tips

  • Email address changes
    The email address received in the SAML claim is the primary user identifier. If it changes, the user may be treated as a new identity.
  • Maximum SSO session lifetime
    12 hours
  • Idle SSO session timeout
    2 hours
  • Supported SAML bindings
    HTTP POST (preferred) and HTTP Redirect
  • SAML debugging tool
    Use the SAML-tracer browser extension for Chrome and other Chromium-based browsers or Firefox
  • Supported SSO flow
    SP-initiated only. The SSO flow starts when the user opens the Resistant AI Web UI URL.
  • IdP-initiated sign-in
    If the SSO flow is started directly from the identity provider without opening the Web UI URL, and no Sign-on URL is configured, the user may be redirected to the Resistant AI Okta dashboard instead of the Document Forensics application. This page is useful for checking account details and recent activity, but it is not the main application entry point. The page is available at https://eu.id.resistant.ai/account-settings/home.
If the Web UI does not load after login, confirm your corporate network allowlist rules: see Domains to allowlist.

Next steps