Skip to content
  • There are no suggestions because the search field is empty.

SecureExchange & Entra ID Tenant Instance Configuration

Introduction

This guide describes how to integrate SecureExchange in Microsoft Entra ID (formerly Azure AD) using SCIM Provisioning and SAML SSO.

  • SCIM Provisioning enables user management for SecureExchange directly within Entra ID. Supported user types include administrators and advisors.

  • SAML SSO allows users to sign in to SecureExchange with their Entra ID credentials.

You’ll have to create and configure SecureExchange as a new Enterprise application. To do so you will need to login to EntraID configuration page and you will need to receive some data from the SecureExchange team.

The purpose of this guide is to ensure a consistent setup process, reduce manual configuration errors, and clarify the specific terminology used in the context of SecureExchange.

SecureExchange Glossary

Term

Description

Exchange

A shared secure vault to exchange documents (typically in the context of a business process).

Advisor

An advisor can create exchanges and invite clients to exchanges. An advisor can login to SecureExchange via Entra ID (SAML SSO).

Admin

An admin can (re)assign advisors as deputies to exchanges. An admin can login to SecureExchange via Entra ID (SAML SSO).

An admin needs to be promoted by a tenant before the admin can manage exchanges.

Tenant

A tenant is a kind of super user. Admins, advisors, and exchanges always belong to a tenant. A tenant can only login using username and password.

Pre-requisites

Before starting the configuration, make sure you have the following:

  • An active Microsoft Entra ID tenant with administrative permissions.

  • Access to the Azure Portal.

  • SecureExchange requires the following Entra ID properties for its users: givenName, familyName, email and phoneNumber

  • You have received the following from SecureExchange team:

    • <SECURE_EXCHANGE_SCIM_URL> - URL to the SCIM endpoints of SecureExchange

    • <SECURE_EXCHANGE_SAML_URL> - URL for SAML login to SecureExchange

    • <BEARER_TOKEN> - used to authenticate EntraID calls in SecureExchange

    • <TENANT_ID> - tenant id to setup login

 

Application Creation

A new Enterprise application needs to be created in order to integrate SecureExchange.

  • Click on Entra ID > Enterprise applications and New Application

Screenshot 2025-09-19 at 11.44.10

  • Click "Create your own application"

Screenshot 2025-09-19 at 11.56.29

  • Assign a name to the application. The name needs to be unique on your EntraId. In a multi-tenant SecureExchange it might make sense to append a tenant-specific identifier, e.g. SecureExchange_Tenant1

  • Choose "Integrate any other application you don’t find in the gallery (Non-gallery)" click Create

Screenshot 2025-09-19 at 12.03.53

Configure SCIM Provisioning

This configuration is needed in order to define which parameters of the users will be passed by Entra ID to SecureExchange. Entra ID will sync with SecureExchange every 40 minutes.

Create User Roles

SecureExchange support stwo roles: admin (ADMIN) and advisor (ADVISOR)

  • Click on App registrations > All applications

Screenshot 2025-09-19 at 15.14.33

  • Select SecureExchange application

  • Select Manage > App roles

Screenshot 2025-09-19 at 15.15.54

  • Create app role for the admin

  • Use ADMIN for display name and value, and add some meaningful description

Screenshot 2025-09-19 at 15.19.06

  • Create app role for the advisor

  • Use ADVISOR for display name and value, and add some meaningful description

Screenshot 2025-09-19 at 15.20.37

  • Delete all other existing roles to avoid wrong assignments

Screenshot 2025-10-08 at 11.46.50

Configure Provisioning

For the provisioning we need to define the endpoints, tenant bearer token, and user attribute mapping.

  • Click on Enterprise Aplications><ApplicationName>

Screenshot 2025-09-19 at 16.55.31

  • Click on Manage -> Provisioning → Get started

Screenshot 2025-09-19 at 12.12.00

  • Set Provisioning Mode to: Automatic

  • Provide the SCIM settings:

    • SCIM endpoint: <SECURE_EXCHANGE_SCIM_URL>

    • Secret Token: <BEARER_TOKEN>

  • Test Connection → it should pass if SCIM endpoints are live

  • Click Save

  • Refresh page to see the applied changes

Screenshot 2025-09-19 at 12.22.55

Provisioning Scope

SecureExchange doesn’t support syncing groups. This must be disabled in the created application

  • Click on Provisioning Microsoft Entra ID Groups

  • Disable and Save (maybe refresh page will be needed to update the status)

Screenshot 2025-09-19 at 14.15.18

User Attribute Mapping

SecureExchange needs only an subset of the Entra ID user attributes. For some of these attributes a specific mapping is required.

  • Click on Provisioning Microsoft Entra ID Users

Screenshot 2025-09-19 at 13.54.56

  • Delete any other existing mapping such that only the parameters below are configured.

    • username ( Specific Mapping described bellow)

    • active

    • email ( Specific Mapping described bellow)

    • preferredLanguage ( Specific Mapping described bellow)

    • name.givenName

    • name.familyName

    • phoneNumbers[type eq "mobile"].value

    • externalId ( Specific Mapping described bellow)

    • userType ( New Custom AttSpecific Mapping described bellow)

Screenshot 2025-09-12 at 16.04.32

The specific mapping of a property can be defined by clicking on “Edit”. It is recommended to save after each property mapping.

Screenshot 2025-09-19 at 15.07.41

Mapping userName

In SecureExchange user names cannot be updated. Hence, the user name should only be sent during creation.

  • Click Edit userName

  • Set this property to be sent Only during object creation

Screenshot 2025-07-22 at 10.00.12

  • Ok
Mapping Email

In SecureExchange email is mandatory, you can use the default value defined on mail or you can map to use userPrincipalName in case of your users doesn’t have this information on mail .

Mapping User Language

The user language will be applied as the default for all users within the configured tenant. Since this value can be modified directly in the SecureExchange application, Entra ID does not need to send updates for it.

  • Click Edit preferredLanguage and set with a Mapping type Constant and in the constant Value set one of the following values: EN or DE or FR or IT

Screenshot 2025-09-19 at 14.34.35

  • Set this property to be sent Only during object creation

Screenshot 2025-07-22 at 10.00.12

  • Ok
Mapping externalId

The external id should be sent only during the creation and the object id shall be used as external id.

  • Click Edit externalId

  • Set this property to be sent only on creation

Screenshot 2025-07-22 at 10.00.12

  • Set the source with objectId

Screenshot 2025-09-19 at 14.45.37

  • Click on OK

Mapping userType

The user type defines whether the user is an admin or an advisor. A user can only be an admin or an advisor, but not both.

  • Click on Add new Mapping

Screenshot 2025-09-19 at 14.59.09

  • Define mapping type to expression and use the following expression : SingleAppRoleAssignment([appRoleAssignments])

  • Target with userType (if this target doesn’t exist it has to be created in EntraId)

  • Click on OK

Screenshot 2025-09-19 at 15.04.01

  • Check if everything is fine and save

Screenshot 2025-09-19 at 15.08.56

Enable Provisioning

Once everything is configured, you can start provisioning. Entra ID will then manage the SecureExchange users based on your tenant’s data.

  • Add Users/ Groups to the application

  • Test provisioning on Demand selecting a valid user for the application and check if the provisioning is working for a sample user.

Screenshot 2025-09-29 at 17.11.28

  • Click on Provisioning > Overview > Start provisioning

Screenshot 2025-09-19 at 17.02.21
Screenshot 2025-09-19 at 17.00.47

Configure SAML SSO

This section describes how to configure SAML SSO for SecureExchange. The setup involves defining the SAML endpoints, exchanging metadata, and mapping the required attributes and claims. After configuration, users can sign in to SecureExchange with their Entra ID credentials, subject to the access policies already enforced in Entra ID.

In SecureExchange, only provisioned users are allowed to log in. This means SAML SSO authentication is limited to accounts that have been synchronized and authorized in advance, providing tighter access control.

  • Click on Single sign-on and SAML

Screenshot 2025-09-19 at 17.03.46

Screenshot 2025-09-19 at 17.04.39

  • Click on Basic SAML Configuration Edit

    • Add Identifier→ <TENANT_ID>

    • Add Reply URL <SECURE_EXCHANGE_SAML_URL>

    • Press “Save”

Screenshot 2025-09-19 at 17.10.04

Screenshot 2025-09-19 at 17.13.32

  • Download the Federation Metadata XML and copy the App Federation Metadata URL

Screenshot 2025-09-19 at 17.21.46

  • Share the following attributes with the SecureExchange team to enable SAML login on your instance:

    • App Federation Metadata URL

    • Federation Metadata XML