SSO Setup for Vrex using Microsoft Entra Azure AD
๐ How to Set Up SSO with Microsoft Entra (Azure AD) for Vrex
This tutorial guides you through connecting your Microsoft Entra (Azure AD) with Vrex using SAML 2.0.
โ Prerequisites
- Access to Microsoft Entra (Azure AD) with rights to create enterprise applications
- Permission to manage your organization’s domain configuration
- Email address for your Vrex contact or
admin@vixel.no
๐งฉ Step 1: Create a New Enterprise Application
- Go to your Microsoft Entra admin portal.
- Navigate to:
Home โ Enterprise Applications โ New Application - Select โCreate your own applicationโ
- Name it: Vrex Client App or Vrex SSO
- Choose: Integrate any other application you donโt find in the gallery (Non-gallery)

๐ Step 2: Configure SAML-based Single Sign-On
In the new application:
- Go to Single sign-on
- Select SAML as the sign-on method

Basic SAML Configuration:
Enter the following values exactly:
| Field | Value |
|---|---|
| Identifier (Entity ID) | urn:amazon:cognito:sp:eu-central-1_FRYkSJ41S |
| Reply URL (ACS URL) | https://auth.vrex.no/saml2/idpresponse |
Note: These values must match exactly. Use copy/paste to avoid typos.

๐งพ Step 3: Add User Attributes & Claims
Under Attributes & Claims, click Edit. Ensure the following claims are present:
emailgivennamesurnameuserprincipalname
If missing, add them manually with the following mappings:
| Claim Name | Value |
|---|---|
| http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress | user.mail |
| http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname | user.givenname |
| http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname | user.surname |
| http://schemas.xmlsoap.org/ws/2005/05/identity/claims/userid | user.userprincipalname |

๐ Step 4: Provide Federation Metadata to Vrex
Copy the App Federation Metadata URL from your SAML configuration overview.
Email the following information to admin@vixel.no:
Subject: [SSO Setup Info] - Vrex Integration
- Company name:
- SSO App name:
- Federation Metadata URL:
- Your email domain (e.g., company.com)
This enables the Vrex team to configure their system to trust your Entra SAML identity provider.

๐งช Step 5: Confirm Vrex Configuration
After receiving confirmation from Vrex:
- Log in to your Vrex Client Admin Panel
- Go to:
App Clients โ [Your Client App] โ Edit managed login page configuration - Enable the new identity provider (named e.g.,
yourcompany-Entra)
๐ฏ Done!
Your users can now access Vrex using their Microsoft Entra credentials via SSO.
๐ ๏ธ Troubleshooting & Support
If you experience issues during setup or login, email [admin@vixel.no](mailto:admin@vixel.no) with a description and screenshots if possible.