SciNote provides a user-friendly, self-service setup option for configuring Single Sign-On (SSO) on your instance.
To learn how to enable SSO inside SciNote, start with this article.
To set up your SSO start by registering the Application in Azure Entra
- Log in to the Azure Portal
- Navigate to Microsoft Entra ID in the left-hand menu.
- In the Manage section, go to App registrations.
- Click + New registration .
- Fill out the details:
-
Name : Provide a name for your application, such as
SciNote App
. -
Supported account types : Choose the appropriate option based on who can sign in (e.g., organizational directory, personal accounts, etc.).
-
Redirect URI : Select Web platform type and specify the URL to which Azure Entra will redirect users during sign-in process. (e.g.,
https://<yourinstancename>.scinote.net/users/auth/customazureactivedirectory/callback
).
-
- Click Register to complete the process.
Configure Authentication:
- In the newly created application, go to the Authentication tab in the left-hand menu.
- Enable ID tokens if they are not already enabled. Ensure the "Implicit grant and hybrid flows" section has "ID tokens" checked.
- (Optional) Add Signatures redirect URL if you would like to sign tasks with SSO:
-
Under "Redirect URIs," click + Add URI .
-
Enter your Signatures redirect URI (e.g.,
https://<yourinstancename>.scinote.net/electronic_signatures/azure_signing_callback
) and click Save.
-
Retrieve Application Credentials:
- Go to the Certificates & Secrets tab in the left-hand menu.
- Under "Client secrets," click + New client secret .
- Provide a description and expiry duration for the client secret, then click Add .
- Copy the generated Value (not Secret ID!) immediately (this is your
client_secret
). You won’t be able to view it again later. - Note down these values:
-
Application (Client) ID : Found on the application overview page.
-
Application (Client) Secret : Generated on the previous step. (e.g.,
client_secret
) -
Directory (Tenant) ID : Found on the application overview page.
-
OpenID Connect metadata document : Found on the application overview page, click Endpoints button
-
Map Custom Attributes (email, first_name, last_name)
When Azure issues an ID token, it includes standard claims. To retrieve theemail
, first_name
, and last_name
attributes:- Ensure the user has these attributes populated in their Azure profile (in Azure Portal → Azure AD → Users → Select User → Edit Properties).
- Customize the claims if necessary:
-
Go to the App registrations page and select your application.
-
Navigate to Token configuration → + Add optional claim .
-
Select ID as the token type and add the following claims:
-
email
-
given_name
(mapped tofirst_name
). -
family_name
(mapped tolast_name
).
-
-
Click Add to save.
-
Confirm required permissions in order to include these attributes in ID tokens.
-
Configure SciNote Application:
- In SciNote navigate to Organization Settings page
- Scroll down to Single sign-on (SSO) section and select Microsoft Entra ID.
- Configure the following parameters:
-
Application ID : Your Application ID from Step 3.
-
Tenant ID : Your Tenant ID from Step 3.
-
Client Secret : Your client secret from Step 3.
-
OpenID Connect metadata document : Your OpenID Connect metadata document URL from Step 3.
-
Enable sign in label : enter desired label for sign in button, for example Sign in with Entra ID.
-
Enable signing tasks with SSO: check it if you would like to sign tasks with SSO and you added Signatures redirect URL on Step 2.
-
-
Click Save button
If you have any questions, contact us at support@scinote.net. For more information about the Premium plans, please request a quote.