Skip to content
English
  • There are no suggestions because the search field is empty.

Lendware Azure Entra SAML SSO & SCIM Integration Guide

This guide provides step-by-step instructions for configuring Single Sign-On (SSO) and automated user provisioning (SCIM) between your Microsoft Entra (formerly Azure AD) environment and Lendware.

By completing this integration, your team members will be able to log into the Lendware CRM using their existing Microsoft credentials, streamlining access and enhancing security. Furthermore, user provisioning will be automated, ensuring that when you grant access in Entra, the user is automatically created in Lendware's authentication system.

How It Works

The integration establishes a secure handshake between your Microsoft Entra enterprise account and Lendware's Auth0 authorization service.

  1. Access Control: You control which users have access to Lendware directly from your Entra environment.
  2. Automated Provisioning: Entra automatically provisions users in Lendware's authentication system via SCIM.
  3. User Invitation: A Lendware administrator invites the provisioned users within the Lendware Enterprise Settings.
  4. Seamless Login: Users navigate to the Lendware application and log in using their Microsoft email and SSO credentials, bypassing the need for a separate Lendware password.

Prerequisites

Before beginning the configuration, ensure you have the following:

  • An active Microsoft Entra (Azure AD) enterprise or business account.
  • Administrative access to your Entra environment (or the ability to provide temporary admin access to the Lendware Implementation team).
  • Your company's email domain(s) that will be used for SSO.

Configuration Steps

The setup process requires coordination between your team and the Lendware Implementation team. You will configure the application in Entra, provide specific details to Lendware, and then Lendware will provide the final credentials needed to complete the SCIM provisioning setup.

Step 1: Create the Enterprise Application in Entra

  1. Log in to the Microsoft Entra (Azure) portal.
  2. Navigate to Enterprise Applications.
  3. Click + New Application.
  4. Select + Create your own application.
  5. Enter a descriptive name for the application (e.g., Lendware Auth0 SSO).
  6. Select the option: Integrate any other application you don't find in the gallery (Non-gallery).
  7. Click Create.

Step 2: Configure Single Sign-On (SAML)

Once the application is created, you need to configure the SAML settings.

  1. In the application menu, select Single sign-on.
  2. Choose SAML as the single sign-on method.
  3. In Section 1 (Basic SAML Configuration), click the edit icon and enter the following values provided by the Lendware team:
      • Identifier (Entity ID): urn:auth0:aidium-production:AzureSSO-<customerName> (Lendware will provide your specific customer name value)
      • Reply URL (Assertion Consumer Service URL): https://auth.lendware.app/login/callback?connection=AzureSSO-<customer-name> (Lendware will provide your specific customer name value)
  4. In Section 2 (Attributes & Claims), click the edit icon. Modify the following claims while keeping the default initial fields:
    • Set emailaddress to user.userprincipalname
    • Set name to user.displayname
  5. In Section 3 (SAML Certificates), download the Certificate (Base64)
  • Action Required: Securely provide this certificate file to the Lendware Implementation team
  1. In Section 4 (Set up [Your App Name]), copy the Login URL
  • Action Required: Securely provide this URL to the Lendware Implementation team

Step 3: Assign Users

Specify which users in your organization should have access to Lendware via SSO.

  1. Navigate to Users and groups within your Lendware enterprise application in Entra.
  2. Click + Add user/group.
  3. Select the users or groups that require access.
  4. Click Select, and then click Assign.

Step 4: Configure Automated Provisioning (SCIM)

Note: You must wait for the Lendware Implementation team to provide the Admin Credentials before completing this step.


  1. Navigate to Provisioning within your Lendware enterprise application in Entra.
  2. Click + New configuration (or Update credentials if modifying an existing setup).
  3. Set the Provisioning Mode to Automatic.
  4. Under Admin Credentials, enter the details provided by the Lendware team:
    • Authentication method: Bearer authentication
    • Tenant URL: https://aidium-production.us.auth0.com/scim/v2/connections/con_abxxx.../ (Lendware will provide the exact URL)
    • Secret token: (Lendware will provide the secure token)
  5. Click Test connection to ensure the credentials are valid.
  6. Click Save.

Step 5: Configure Attribute Mappings

After saving the provisioning credentials, you must configure how user attributes map between Entra and Lendware.

  1. Under the Mappings section, select Provision Azure Active Directory Groups.
  2. Disable or remove the externalId attribute mapping.
  3. Click Save.
  4. Return to the Mappings section and select Provision Azure Active Directory Users.
  5. Enable the mapping and remove all attributes except the first three (typically userName, active, and displayName or similar core attributes).
  6. Click Save.

Step 6: Enable Provisioning

  1. Return to the main Provisioning page.
  2. Set the Provisioning Status toggle to On.
  3. Click Save.
  4. Navigate to the Overview page to monitor the provisioning status. It may take some time for the initial synchronization cycle to complete.

Important Considerations & Best Practices

  • Provisioning Order: The SCIM provisioning (Entra syncing to Auth0) must occur before you invite users into the Lendware platform. The users must exist in the authentication system first.
  • Lendware Invitation: Even after users are provisioned via SCIM, a Lendware administrator must still invite them within the Lendware platform (Enterprise Settings > Members) so they exist in the Lendware database and can be assigned appropriate roles.
  • Adding New Users: When adding new users to the Entra application after the initial sync, you may need to click Provision on demand in Entra to expedite their creation in Lendware's authentication system.
  • Access Control: It is your organization's responsibility to manage which users are assigned to the Lendware application within Entra.

Note: Once SSO is enabled for your domain in Lendware, only users provisioned through your identity provider will be able to access the system. Attempting to invite or add a user directly within the CRM who has not been provisioned will result in an error message.

Support

If you encounter any issues during the configuration process or have questions regarding the required values, please contact the Lendware Implementation team or your dedicated Customer Success Manager.