Set Up Azure AD (Microsoft Entra ID) SSO for JustCall
Set Up Azure AD (Microsoft Entra ID) SSO for JustCall
Connect JustCall to Microsoft Entra ID (formerly Azure Active Directory) so your team can log in with their Microsoft credentials. This guide covers SAML configuration and optional user provisioning. SSO is available on the Business plan.
Prerequisites
- JustCall Business plan
- Microsoft Entra ID admin access (Global Administrator or Application Administrator role)
- A verified email domain in JustCall
Step 1: Enable SSO in JustCall
- Go to Settings → Security → Single Sign-On in JustCall.
- Click Enable SSO and select SAML 2.0.
- Copy the ACS URL and Entity ID values.
Step 2: Create an Enterprise Application in Entra ID
- Log into the Microsoft Entra admin center.
- Go to Identity → Applications → Enterprise applications.
- Click New application → Create your own application.
- Name the app JustCall and select Integrate any other application you don't find in the gallery (Non-gallery).
- Click Create.
Step 3: Configure SAML SSO
-
In the JustCall enterprise application, go to Single sign-on → SAML.
-
Edit Basic SAML Configuration:
- Identifier (Entity ID): Paste the Entity ID from JustCall
- Reply URL (ACS URL): Paste the ACS URL from JustCall
- Sign on URL:
https://app.justcall.io/login
-
Click Save.
-
Edit Attributes & Claims:
Claim Name Source Attribute email user.mail firstName user.givenname lastName user.surname -
Under SAML Certificates, download Certificate (Base64).
-
Under Set up JustCall, copy:
- Login URL (SSO URL)
- Azure AD Identifier (Issuer)
Step 4: Complete Configuration in JustCall
- Return to Settings → Security → Single Sign-On in JustCall.
- Enter:
- SSO URL: Paste the Login URL from Entra ID
- Issuer / Entity ID: Paste the Azure AD Identifier
- Certificate: Upload the Base64 certificate
- Set the Default Role for new SSO users.
- Click Save Configuration.
- Click Test Connection to validate.
Step 5: Assign Users and Groups
- In the Entra admin center, go to your JustCall enterprise application.
- Click Users and groups → Add user/group.
- Select the users or security groups that should have access to JustCall.
- Click Assign.
Only assigned users can log in via SSO. Unassigned users see an "access denied" error.
Optional: User Provisioning (SCIM)
If you want users automatically created and deactivated in JustCall based on Entra ID group membership:
- In the JustCall enterprise application, go to Provisioning.
- Set Provisioning Mode to Automatic.
- Enter the Tenant URL and Secret Token from JustCall (found under Settings → Security → Provisioning).
- Click Test Connection, then Save.
- Map attributes:
userName→ email,givenName→ firstName,familyName→ lastName. - Set the provisioning scope (sync assigned users only or all users).
- Turn provisioning On.
Provisioning syncs every 40 minutes. New Entra ID users are created in JustCall automatically. Disabled Entra ID users are deactivated in JustCall.
Troubleshooting
| Issue | Solution |
|---|---|
| "AADSTS50011" redirect error | Verify the Reply URL in Entra ID matches the ACS URL in JustCall exactly. |
| Claims not received | Ensure attribute mappings use the correct source attributes (user.mail, not user.userprincipalname, unless UPN matches email). |
| Provisioning failures | Check the provisioning logs in Entra ID for specific attribute errors. |