This topic explains how to configure SAML-based Single Sign-On (SSO) using Microsoft Entra ID (formerly Azure Active Directory) and enable group mapping so Traceable can automatically assign user roles based on Azure group membership.
This guide is intended for Azure AD administrators.
Before You Begin
Ensure you have the following:
Admin access to Microsoft Entra ID/Azure AD.
The Traceable enterprise application has already been added and configured for SAML.
Azure groups have already been created, and users have been assigned to them.
Admin access to the Traceable UI.
Step 1: Configure Group Claims in Azure AD
Sign in to the Microsoft Entra admin center
Go to Enterprise applications → [Your Traceable App]
Under Manage, click Single sign-on
In the Attributes & Claims section, click Edit
Click + Add a group claim
Choose one of the following options:
All groups — includes all groups assigned to the user
Security groups — includes only security groups
Choose ID as the group identifier format (or use Group Names if supported)
(Optional) Filter groups using advanced filters
Click Save
This ensures that Azure AD includes the group information in the SAML response.
Step 2: Test and Extract the Group Attribute Name
In the Single sign-on section of your Traceable app, click Test
Use the built-in test user or sign in with a real user to complete a test login
Download or inspect the SAML response
Look for entries like:
<Attribute Name="http://schemas.microsoft.com/ws/2008/06/identity/claims/groups"> <AttributeValue>GroupObjectID</AttributeValue> </Attribute>
Depending on how group claims are configured, the attribute name may vary (you may also see groups
, roles
, etc.). Note the exact name and group values.
Step 3: Map Groups to Roles in Traceable
In the Traceable UI, go to Configuration → Team
Click the SAML Config tab
Enter the exact group attribute name from the Azure SAML assertion
Click + Add Group to define mappings:
SAML Group: Enter the Object ID or group name received from Azure
Role: Choose the corresponding Traceable role
Scope: Define whether the role applies globally or to specific apps
Click Add Role, then Save
What’s Next?
After setup:
Users signing in through Azure AD will be assigned roles based on group membership
You can update or remove group-role mappings at any time
Return to the SAML Configuration topic to continue with the rest of the SAML configuration process.