Skip to main content

Configure SAML SSO between Microsoft Entra ID and Comeen Play

Updated yesterday

This article explains how to configure Single Sign-On (SSO) between Microsoft Entra ID and Comeen Play using the SAML 2.0 protocol.

With this configuration, users authenticate through Microsoft Entra ID and are automatically logged into Comeen Play.


Prerequisites

  • You have admin access to Microsoft Entra ID

  • You have access to Comeen Play settings


Step 1 - Create the SAML application in Microsoft Entra ID

  1. Go to the Microsoft Entra admin center

  2. Navigate to Enterprise applications

  3. Click New application

  4. Click Create your own application

  5. Enter a name (e.g. Comeen Play)

  6. Select Integrate any other application you don't find in the gallery (Non-gallery)

  7. Click Create

Once created:

  1. Open the application

  2. Go to Single sign-on

  3. Select SAML

Keep this page open - you will need it for the next steps.


Step 2 - Configure the Identity Provider in Comeen Play

  1. Go to Comeen Play β†’ Settings

  2. Click Authentication

  3. In the SAML SSO section, enable Enable this authentication method

  4. Click Configure SAML

In Microsoft Entra ID:

  1. In the SAML configuration page, locate the section Set up Comeen Play

  2. Copy the following values:

    • Login URL

    • Microsoft Entra Identifier

  3. Now, locate the "SAML Certificates" section, and click on the 'Download' button next to 'Certificate (Base64)

  4. Open the downloaded file with a text editor and copy the whole text.

In Comeen Play:

  1. Paste these values into the corresponding fields:

    • IdP SSO URL β†’ Login URL

    • IdP Entity ID β†’ Microsoft Entra Identifier

    • IdP Certificate β†’ Text contained in the downloaded certificate


Step 3 - Configure the Service Provider in Microsoft Entra ID

In the Comeen Play SAML configuration window, copy the following values under the 'Service Provider Information':

  • ACS (Assertion Consumer Service) URL

  • Entity ID

Then go back to Microsoft Entra ID:

  1. In the SAML configuration page, click Edit in the Basic SAML Configuration section

  2. Fill in:

    • Identifier (Entity ID) β†’ paste the Comeen Entity ID

    • Reply URL (ACS URL) β†’ paste the Comeen ACS URL

  3. (Optional) Add:

    • Sign-on URL β†’ Comeen Play login URL

  4. Click Save


Step 4 - Configure user attributes and claims

In Microsoft Entra ID:

  1. Go to Attributes & Claims

  2. Ensure the following mapping exists:

Claim name

Value

email

user.mail

displayname

user.displayname

3. Set the NameID format to Email address

You can also add additional attributes if needed (first name, last name, groups, etc.)


Step 5 - Assign users to the application

  1. Go to Users and groups

  2. Click Add user/group

  3. Select the users or groups who should access Comeen Play

  4. Click Assign


Step 6 - Save and test the SSO login

  1. Save the configuration in both:

    • Microsoft Entra ID

    • Comeen Play

  2. Open the Comeen Play login page

  3. Start the login process

You should be redirected to Microsoft Entra ID to authenticate, then back to Comeen Play.


Step 7 (optional) - Automatic role and group synchronization

Comeen Play can automatically assign roles and groups based on SAML attributes.

Enable synchronization

  1. Open the SAML configuration in Comeen Play

  2. Go to User Attribute Synchronization

  3. Enable Automatic role and group synchronization


Group or Role mapping

To automatically assign users to groups:

  1. Go to User Groups or Roles in Comeen Play

  2. Edit a group

  3. Click Add Mapping

  4. Enter:

    • Attribute name (e.g. department)

    • Expected value (e.g. Marketing)

If the SAML attribute matches, the user is automatically added to the group or assigned the corresponding role.

⚠️ Attribute matching is case-sensitive.


Troubleshooting tips

  • Ensure the email address matches between Entra ID and Comeen

  • Verify the certificate is correctly copied and saved on Comeen

  • Check that users are assigned to the application

  • Confirm the ACS URL and Entity ID are correctly configured


Your SAML SSO setup with Microsoft Entra ID is now complete.

Did this answer your question?