This feature is only available on a Mentorloop Enterprise plan
Prerequisite: Contact customer success to get started
If you haven't yet discussed SSO with us, let your customer success manager (CSM) know you'd like to enable it. Your CSM can get the process started to enable SSO via SAML for your mentoring program. Once you're ready to go, we will send you an email with the details you need to complete the steps below.
Step 1: Add the Mentorloop Application
From the Microsoft Entra ID dashboard, click Enterprise applications in the left nav.
Click New application in the top menu.
Click Create your own application.
Give your application a name. This is the name your users will see for the application in their dashboard. We recommend using Mentorloop SSO. Click Create to continue.
Step 2: Configure SAML SSO
1. From the application dashboard, click Single sign-on.
2. Click SAML for the single sign-on method.
3. Click Upload metadata file. Select the file provided to you by Mentorloop, and click Save.
4. In the Attributes & Claims section, click Edit.
5. Click Unique User Identifier (Name ID).
6. Select Persistent as the Name identifier format. Click Save. Close this screen and the next with the X button at the top right.
Let us know what additional claims you would like to map to your participant profile fields.
7. You are now able to assign users or groups to the newly created application. Please refer to the Microsoft Entra ID documentation for information on provisioning users for applications.
Please ensure that all eligible users are granted permission to this SAML application to avoid barriers to joining the mentoring program.
Step 3: Setting up SCIM with Microsoft Entra ID
Obtain your SCIM endpoint and token
Contact Mentorloop to enable SCIM for your account.
If you are not setting up automatic deprovisioning with SCIM, skip to Step 4.
You will receive:
-
- SCIM Base URL:
https://{mentorloop domain}/scim/saml/{provider name} - SCIM Bearer Token: A unique authentication token
- SCIM Base URL:
Configure SCIM in Entra ID
-
Sign in to the Azure portal
-
Navigate to Azure Active Directory > Enterprise applications
-
Select your existing Mentorloop SAML application
-
In the left navigation, select Provisioning
-
Click New configuration
-
Under Admin credentials, enter:
-
Tenant URL: Your SCIM Base URL
-
Secret Token: The SCIM Bearer Token provided by Mentorloop
-
-
Click Test connection to verify the credentials
-
Attribute mappings:
- Disable for Groups
- Enable for Users and ensure the following attributes are mapped:
-
Enable
Deletefor Target Object Actions -
userNameto the appropriate attribute (typically email or userPrincipalName). Note: This needs to match the same attribute that your SAML configuration uses for Name ID. -
activeensure the attribute is being sent asfalsewhen a user is deleted or disabled in Entra ID.
-
- Click Start provisioning
Verifying deprovisioning works
To verify that deprovisioning is working correctly:
-
Entra ID:
- Disable a test user in Entra ID or remove their assignment to the Mentorloop SAML application
- Check the provisioning logs in Entra ID to confirm the deprovisioning action was sent
-
In Mentorloop:
- Verify the user can no longer log in by attempting to login as that user.
- As a Program Coordinator (PC) or an Org Admin, confirm the user has been removed from your programs.
Troubleshooting
Common issues and solutions
| Issue | Possible solutions |
| Failed connection test |
- Verify SCIM URL and token are correct - Ensure your network allows communication to Mentorloop's SCIM endpoint - Contact Mentorloop support |
| Users not being deprovisioned |
- Check that deprovisioning is enabled in your IdP settings - Verify user mappings are correctly configured - Check logs in your IdP for errors |
| Error during provisioning sync |
- Review provisioning logs in your IdP - Ensure all required attributes are properly mapped - Contact Mentorloop support with error details. |
Provisioning logs
Entra ID provides detailed logs for provisioning events:
- Entra ID: Navigate to Azure Active Directory > Enterprise applications > Your Mentorloop SAML app > Provisioning logs
Need help?
If you encounter any issues while setting up SCIM deprovisioning, please contact Mentorloop support with:
- Screenshots of your configuration
- Any error messages you're receiving
- Details about the specific problem you're experiencing
Step 4: Provide Mentorloop with the generated metadata URL
In order to integrate your Active Directory with the Mentorloop application, the Mentorloop team requires some configuration data.
In the SAML Signing Certificate section, click the Copy button for the App Federation Metadata Url field. Provide this value to Mentorloop.
Mentorloop will provision the SSO login for your programs and follow up with you on next steps for confirming the SSO setup.