Overview
This guide walks you through configuring SAML single sign-on with Microsoft Entra ID. You’ll create an Enterprise application in Entra ID, configure SAML settings, and establish a secure connection between your identity provider and Langdock. Once complete, your users will be able to sign in to Langdock using their Entra ID credentials.Setup Checklist
Verify that you have completed these steps from the setup checklist:Create a new Enterprise application in Entra ID
Next, you need to create a new Enterprise application in your Entra ID portal. To do this, follow these steps:- In your Entra ID portal navigate to the Overview page and add a new Enterprise application under ”+ Add” → “Enterprise application”
- Create a new custom application by clicking on ”+ Create your own application”
- Name your application (e.g., “Langdock”)
- Select the option “Integrate any other application you don’t find in the gallery (Non-gallery)“


SAML Configuration
Langdock uses SAML 2.0 as the standard for SSO authentication. After creating the application, you need to configure the SAML settings, which will allow Langdock to authenticate users via SAML. First, navigate to the “Single sign-on” settings of your newly created application, by selecting “Set up single sign on” and choosing “SAML” as the single sign-on method.

- The “Audience URI (SP Entity ID)” value(
langdock.com) - The “Assertion Consumer Service (ACS) URL” value

- “Identifier (Entity ID)”: The “Audience URI (SP Entity ID)” value from Langdock
- “Reply URL (Assertion Consumer Service URL)”: The “Assertion Consumer Service (ACS) URL” value from Langdock


- Setting the “Signing Option” to “Sign SAML response and assertion”
- Setting the “Signing Algorithm” to “SHA-256”


- In the “SAML Signing Certificate” section of your Entra ID portal, click on “Download” next to “Certificate (Base64)” link to download the certificate. You have to open the certificate in a text editor and copy the content. This will be in the format of:
- Copy the “Login URL” value from the “Set up Langdock” section in your Entra ID portal.

- Fill in the “Issuer” field with the Audience URI specified earlier (
langdock.com). - Paste the “Login URL” value from Entra ID into the “Sign on URL” field
- Paste the SAML Signing certificate content into the “Certificate” field

Test the SAML setup
To test the setup, please stay logged in in the current browser session and open seperate browser or an incognito window and navigate to https://app.langdock.com.


Multiple Workspaces with the Same Entra ID Tenant
If you want to connect multiple Langdock workspaces to the same Entra ID tenant, this is possible but requires manual configuration by the Langdock team.
- Ask the Langdock Team at [email protected]om to create a new Workspace and provide you with the Assertion Consumer Service (ACS) URL.
- Create a separate Enterprise application in Entra ID for each workspace you want to connect (following the same steps as above)
- Use a unique Identifier (Entity ID) for each app registration. Instead of using
langdock.com, use a unique identifier likeyourcompany.langdock.comorworkspace-name.langdock.com - Enter the Assertion Consumer Service (ACS) URL provided by the Langdock Team.
- Contact Langdock support at [email protected] and provide the following information for each additional workspace:
- The Issuer (your unique Entity ID)
- The Login URL (Sign-on URL)
- The Certificate (Base64)
- All E-Mail domains of users that should be able to join the workspace. More details on that here.
Workspace Switching Behavior
When users have access to multiple SAML-enabled workspaces with the same domain:- After entering their email address during login, users will see a workspace picker to choose which workspace to access
- The regular “switch workspace” button is not available for SAML users
- To switch between workspaces, users need to log out and log in again, then select the desired workspace from the picker