Authentication > Integrate Okta
Integrate Azure AD
You’ll connect Microsoft Azure Active Directory to Tallyfy for seamless single sign-on in about 30 minutes. Your users get automatic authentication and account provisioning - no more password juggling.
- Azure subscription with Azure Active Directory access
- Administrator privileges in Azure AD
- Tallyfy Professional or Enterprise plan
- SAML configuration values from Tallyfy Support
Here’s what you’ll do:
- Create an Azure AD enterprise application
- Configure SAML settings in both systems
- Enable and test the SSO connection
-
Sign in to the Azure Portal ↗ with administrator credentials
-
Navigate to Azure Active Directory service
-
Select Enterprise Applications from the Manage section
-
Click +New application
-
Choose Create your own application
-
Enter “Tallyfy” as the application name
-
Select Integrate any other application you don’t find in the gallery (Non-gallery)
-
Click Create
Want to assign users right away? Go ahead. You can also do this after completing the setup:

-
In the application’s sidebar under Manage, select Single sign-on
-
Choose SAML as the sign-on method
-
Click Edit in the Basic SAML Configuration section.
-
Time to grab Tallyfy’s SAML values. Head to your organization’s profile in Tallyfy.
-
Navigate to the Org Settings tab.
-
Click Add Configuration Details.
-
Scroll down to find the default SAML values.
-
Copy the Tallyfy SP ACS URL into Azure AD’s Reply URL (Assertion Consumer Service URL) field.
-
Copy the Tallyfy SP Entity ID into Azure AD’s Identifier (Entity ID) field.
-
Click Save.
This step matters - get it wrong and users won’t sync properly. Let’s set up each attribute:
-
Configure the Name Identifier (User ID): Click the Unique User Identifier (Name ID) row.
-
Select Persistent for Name identifier format.
-
Choose user.mail for Source attribute.
-
Click Save.
-
Configure the First Name Attribute: Click the attribute row (typically user.givenname).
-
Change Name to:
FirstName
(capitalization matters here). -
Clear any value in the Namespace field.
-
Set Source attribute to:
user.givenname
. -
Click Save.
-
Configure the Email attribute the same way: Set Name to
Email
, ensure Namespace is empty, and set Source attribute touser.mail
. Click Save. -
Configure the Last Name attribute similarly: Set Name to
LastName
, ensure Namespace is empty, and set Source attribute touser.surname
. Click Save.
Your final attribute configuration should match this:

Back in Azure AD, you’ll need three things:
-
Navigate to the Set up section.
-
Copy the Login URL.
-
Copy the Azure AD Identifier.
-
Download the Certificate (Base64) from the SAML Signing Certificate section.
-
Send the collected Azure AD SAML information to Tallyfy Support
-
Tallyfy Support will configure your organization’s SAML settings with this information
Once Tallyfy Support confirms your SAML settings are ready:
-
Flip the SAML activation toggle to enable SSO for your organization
You’re almost done:
-
Get your organization’s Tallyfy login URL from the SAML setup modal (Tallyfy Support provides this)
-
Share this URL with users who have Azure AD access
What happens when users visit this URL?
- Existing Tallyfy users get authenticated instantly
- New users are automatically provisioned on their first login
Users can’t log in? Here’s your troubleshooting checklist:
- Verify the user is assigned to the Azure AD application.
- Double-check attribute mappings - names and capitalization must be exact.
- Confirm the SAML certificate hasn’t expired.
- Ensure users are using the SSO URL (not the regular login page).
- Still stuck? Contact Tallyfy Support.
Authentication > Integrate OneLogin
Integrations > Authentication and SSO
Authentication > Integrate Google Suite
- 2025 Tallyfy, Inc.
- Privacy Policy
- Terms of Use
- Report Issue
- Trademarks