Empuls integrates with Azure Active Directory (Azure AD) through SAML 2.0, allowing employees to sign in to Empuls using their existing Microsoft corporate credentials. Once connected, access is managed entirely through Azure AD — you provision and deprovision users centrally, and no passwords are stored in Empuls.Documentation Index
Fetch the complete documentation index at: https://empuls.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Prerequisites
Before you begin, make sure you have:- Admin access to the Azure portal
- Super Admin access to Empuls
- Your Empuls tenant URL (for example,
https://yourcompany.empuls.com)
Part 1: Add Empuls as an enterprise application in Azure
Open Azure Active Directory
Create a new application
Select non-gallery application
Assign users
Part 2: Enter Empuls SP values in Azure
You need to copy several values from your Empuls account into the Azure SAML configuration.Open Empuls authentication settings
/home/integrations/saml_sso.Copy or download SP metadata
- Copy the individual SP values listed below, or
- Click Download SP Metadata to get
empuls-sp-metadata.xmland upload it directly into Azure (this auto-fills most fields).
Fill in Azure basic SAML configuration
| Azure field | Value from Empuls |
|---|---|
| Identifier (Entity ID) | Entity ID (format: https://yourcompany.xoxoday.com/chef/sso/metadata-sp/...) |
| Reply URL (ACS URL) | Assertion Consumer Service URL |
| Sign on URL | SSO redirect URL |
| Relay State | Your Empuls login URL |
| Logout URL | IDP logout URL |
emailaddress to user.mail by default. Empuls validates users by Email ID or Employee ID — make sure the Name ID value in the SAML response corresponds to the email address or employee ID stored in Empuls.Part 3: Download Azure metadata and upload to Empuls
Download the Federation Metadata XML
Upload the metadata to Empuls
/home/integrations/saml_sso). In the Identity Provider metadata section, upload the Federation Metadata XML file you downloaded from Azure.Part 4: Test the connection
Click Test Connection
Sign in with Azure credentials
Data flow architecture
When a user logs in after Azure AD SSO is configured, the authentication flow works as follows:- User enters their email on the Empuls login page and clicks Proceed.
- Empuls identifies the SAML configuration and redirects the user to Azure AD.
- Azure AD authenticates the user and issues a signed SAML assertion.
- The assertion is sent back to Empuls via the ACS URL.
- Empuls validates the assertion and grants the user access.
Frequently asked questions
Can I enable two custom SSO options at the same time?
Can I enable two custom SSO options at the same time?
What user attribute does Empuls use to match identities?
What user attribute does Empuls use to match identities?
Can I upload the SP metadata file instead of copying values manually?
Can I upload the SP metadata file instead of copying values manually?
empuls-sp-metadata.xml from the Empuls SAML page and upload it in Azure during the SAML app configuration. Azure auto-populates the Entity ID, ACS URL, and other fields from the file.