Prerequisites
To get started, you need the following items:
An Azure AD subscription
Pirros SAML SSO enabled subscription
Pirros Identifier (Entity ID)
Pirros Reply URL (Assertion Consumer Service URL)
Step 1
Adding Pirros
To configure the integration of Pirros into Azure AD, you need to add Pirros from the gallery to your list of managed SaaS apps.
Sign in to the Azure portal using your work account.
Select Microsoft Entra ID
Navigate to Enterprise Applications and then select All Applications.
To add a new application, select New application.
Select Create your own application.
Under "What's the name of your app?" input Pirros or something similar.
Under "What are you looking to do with your application?" select Integrate any other application you don't find in the gallery (Non-gallery). If a list of recommended gallery applications are shown, do not select any.
Select Create in the bottom of the pane. Wait a few seconds while the app is added to your tenant.
Step 2
Configure Azure AD SSO
Follow these steps to enable Azure AD SSO in the Azure portal.
In the Azure portal, on the Pirros application integration page, find the Manage section and select single sign-on.
On the Select a single sign-on method page, select SAML.
On the Basic SAML Configuration section, click the more/edit icon.
On the Basic SAML Configuration section, enter the values for the following fields:
In the Identifier (Entity ID) section, click Add Identifier and enter the URL located in the SSO tab of your Pirros Settings Page.
In the Reply URL (Assertion Consumer Service URL) section, click Add reply URL and enter the URL located in the SSO tab of your Pirros Settings Page.
Click Save when you have completed steps 1 and 2.
Step 3
Insert Data into Pirros
You must insert the following information into Pirros on the SSO/SCIM tab of your Pirros Settings page in order to enable SSO.
Important: Before proceeding to download the SAML certificate in the next step, make sure you’ve entered and saved both the Entity ID and ACS URL in the Basic SAML Configuration section. Downloading the certificate before this information is saved may result in outdated or invalid metadata being generated.
On the Set up single sign-on with SAML page, in the SAML Certificates section, find Certificate (Base64) and click Download to download the certificate to your computer. You will have to open this file in some kind of text editor so you can copy/paste the text into the Pirros Settings page.
On the Set Up single sign-on with SAML page, in the Set up Pirros section, find Login URL and copy/paste the URL into the Pirros Settings Page.
In the Pirros Settings Page, also add the Domain of your firm’s email addresses (e.g. “architech.com”).
Here is a screenshot from the Pirros page, further indicating what actions should be taken for each field:
Hit the “Submit Data” button in Pirros to save your SSO configuration
Step 4
Add Just-in-Time (JIT) Provisioning (Optional for SSO; Required for SCIM)
JIT Provisioning automates account creation when users log in via SSO for the first time.
Toggle on SSO JIT Provisioning.
Once toggled on, you must select a Default Role and a Default Workspace (if applicable).
Click Save.
Users will be automatically assigned to a seat until there are no seats left.
Admins must manually remove users to free up seats.
Step 5
Add Users and Groups
In this section, you'll add Users and Groups to use Azure single sign-on.
From the left pane in the Azure portal, select Users and Groups.
Select Add Users/Group at the top of the screen.
In the User Properties, follow these steps:
Click Users: None Selected
Find the users in your database that you want to utilize SSO for Pirros.
Click Select.
You will get a notification when the Application assignment succeeds.
Step 6
Configure SCIM User Provisioning (Optional)
SCIM automates user provisioning and de-provisioning, so you don't need to manually manage user assignments. Steps 1–4 must be completed before configuring SCIM.
In the Azure portal, in the Pirros application (that was created in Step 1) select Provisioning in the sidebar. This will navigate you to a Provisioning page. In the sidebar, under Manage, select Provisioning (again).
Set Provisioning Mode to Automatic.
In the Pirros Settings page, toggle SCIM on (The SCIM section won’t even appear until you have submitted your SSO configuration from Step 3). Then copy/paste these values from Pirros to the fields in Admin Credentials.
SCIM Base/Reply URL (in Pirros) → Tenant URL (in Azure)
Bearer Token (in Pirros) → Secret Token (in Azure)
Click Test Connection to verify your credentials.
In the sidebar, navigate to Attribute Mappings, then under Provision Microsoft Entra ID Users (not Groups): ensure Enabled is set to Yes, Target Object Actions are enabled for Create, Update, and Delete, and that the following fields are mapped correctly:
userName -> userPrincipalName
active -> Switch([IsSoftDeleted], , "True", "False", "False", "True").
emails[type eq "work"].value -> mail
name.givenName -> givenName
name.familyName -> surname
Click “Save” on the Attribute Mapping page
Navigate to Users and Groups and make assignments to the app if you haven't already done so in Step 5. Provisioning via Azure happens on a schedule and can take up to 45 minutes. For immediate provisioning, navigate to Provision on demand (you must make assignments prior to using “Provision on demand”)
Now you’re all set. Once Azure processes the provisioning here, the users should be created in Pirros and automatically assigned using the JIT settings you provided in Step 4.







