How To: Integrate EnrolHQ with Azure Active Directory SSO

This is a step-by-step guide on how to configure EnrolHQ and Azure Active Directory to provide SSO to staff users.

Header graphic showing feature

School Staff users of EnrolHQ (Registrars, Finance, IT Admins) can now use their Azure AD credentials to sign-in to their EnrolHQ dashboard instead of using their EnrolHQ specific username/password and SMS for 2FA. This provides IT teams better control over who accesses the dashboard and a more streamlined user experience for staff.

In summary, to setup EnrolHQ with Azure AD you will need to:

  1. Create a new custom Enterprise Application in Azure and use SAML as the sign-on method
  2. Enable SAML Authentication in EnrolHQ and add the App Federation Metadata URL to EnrolHQ
  3. Add the SAML URLs to the Azure Enterprise Application
  4. Setup the "Attributes & Claims" in Azure
  5. Add Users and Groups to the "EnrolHQ" Azure App
  6. Test

Step 1: Create Custom Enterprise Application in Azure

1a) Go to Azure Enterprise Applications and click the + New application button


1b) A panel will slide out from the right, you will need to name the Application "EnrolHQ" and then choose the "Integrate any other application you don't find in the gallery (Non-gallery)" option. Scroll to to the bottom and save.


1c) After you create the application you should see an 'Overview' screen like this:


Click on the 'Get started' to set-up single sign-on.

1d) You'll now be able to choose 'SAML' as the single sign-on method.

Choose SAML as Single Sign-on Method

1e) You'll see a screen with the default SAML configuration, copy the "App Federation Metadata URL" to be pasted into EnrolHQ

Copy App Federation Metadata URL

Step 2: Enable SAML in EnrolHQ

Now log in to EnrolHQ with your username/password at your school's EnrolHQ dashboard e.g and authenticate using SMS if required. Please note that you will need to have the 'admin' role assigned to your user to be able to enable SAML.

When you have logged in to EnrolHQ, in the left hand menu, go to "User Management" near the bottom and then click on "SAML Settings". You will need to toggle it to Enabled, call it "Microsoft Azure SSO" or "Azure AD SSO" so that school staff will see a 'Log in using Azure AD SSO" link when they next to go to EnrolHQ.

Paste the "App Federation Metadata URL" from Azure into the IdP Metadata URL in EnrolHQ and Save.

Enable SAML in EnrolHQ

Once you save this you will now see a screen with EnrolHQ's SAML settings - it will have a metadata URL and an ACS URL that you will need to copy and paste back into Azure:

EnrolHQ SAML Settings

Step 3: Add the SAML URLs to the Azure Enterprise Application

The EnrolHQ portion of the configuration is now complete. Go back to Azure to the "Set Up Single Sign-on" page and click "Edit" in the top right corner of the Basic SAML Configuration box. You will get a slide-out from the right

3a) Copy the metadata URL from EnrolHQ and paste into the Identifier (Entity ID) in Azure

3b) Copy the ACS URL from EnrolHQ and paste into the Reply URL (Assertion Consumer Service URL) in Azure

3c) The Sign On URL is your schools EnrolHQ dashboard login URL e.g where you use your school domain.

3d) The Relay State (Optional) URL is your schools EnrolHQ dashboard login URL (same as above)

3e) Logout URL is where you replace the example domain with your school domain.


Step 4: Setup Claims and Attributes in Azure

EnrolHQ matches the EnrolHQ user email address with the email address of user logging-in via Azure AD. There is no auto-provisioning of accounts for security purposes. You will need to set-up the user on the EnrolHQ side and put them in the correct roles. Therefore the only claim required is 'mail' with no namespace which should be mapped to ''.

4a) First delete the default claims including givenname, name etc. Keep the one that has as the value.

Attributes and Claims Deleting

4b) Now edit the Claim with the value "". You want to remove the namespace completely, and rename the 'Name' to be just 'mail'. The source attribute remains as 'user.mail'

No Namespace Mail Only

4c) You will also need to edit the Unique User Identifier so that it uses '' as it's source attribute. Your final 'Attributes & Claims' screen should look like this:

Final Attributes and Claims

4d) Finally your Azure AD Config should look like this:

Final Azure AD SAML Config

Step 5: Add Users and Groups to the EnrolHQ Enterprise App in Azure

You will need to define a Group of people who have access to EnrolHQ using Azure AD. Remember, because there is no auto-provisioning of staff accounts in EnrolHQ from SSO Identity Providers, your SSO will not work until you have added the staff that require access to EnrolHQ to the Enterprise App Users and Group in Azure.

Add Groups and Users

Step 6: Test

If all the above has been done, you will be able to go back to the EnrolHQ login screen and see the 'Login via Microsoft Azure SSO' link. Providing you have a user account that has been added to the AD Group and also exists in EnrolHQ this should take you to the Microsoft log-in screen and then allow you to log-in using your Microsoft Azure AD SSO credentials.

EnrolHQ Microsoft Azure AD SSO SAML

If your test is successful you will need to go back to EnrolHQ Users page to toggle 'Password Auth' off to force those users to use their Single Sign-On credentials going forward.

Force Use SSO

If you have any questions about this please do not hesitate to get in touch with us via

Published: 16 Jan 2023

Get In Touch

If you have a question, we'll be happy to answer it.

Write us a short note below and we'll get in touch.

You'll be joining these happy HQ clients:

Logos of EnrolHQ clients who use our online enrolments system