Sonafone
Sonafone.
How it worksFeaturesHelpBlog
Get startedLogin
Sonafone.Sonafone.

Sonafone is a cloud-based calling platform that lets you make affordable international calls with crystal-clear quality. Transparent pricing and no hidden fees.

Product

  • How it works
  • Features
  • Business

Resources

  • Help Center
  • Blog

Legal

  • Terms of Service
  • Privacy Policy
  • Acceptable Use
  • 911 Disclaimer
  • CPNI Policy

Get started

Start making cheap international calls today.

Sign up free

© 2026 Cosmo Suite LLC. All rights reserved.

Configure Azure SAML SSO – Sonafone Help Center
Settings & Account
HelpSettings & AccountConfigure Azure SAML SSO

Configure Azure SAML SSO

Connect Azure Active Directory to Sonafone so your team signs in with existing corporate credentials.

Chan

Written by Chan

Last updated Jan 15, 2025
On this page
Step 1: Create or Select SAML ApplicationStep 2: Configure SAML ApplicationStep 3: Attribute MappingStep 4: Copy the Metadata URLStep 5: Configure SAML SSO on SonafoneStep 6: Assign Users

SAML single sign-on is available on Sonafone Scale and Enterprise plans.

Sonafone Scale customers can enforce single sign-on through Azure Active Directory using the SAML 2.0 protocol. The steps below walk through the Azure configuration and the fields Sonafone expects.

Step 1: Create or Select SAML Application

In your Azure Admin console, select Azure Active Directory (or search for it in the search bar).

Azure Active Directory option on the Azure Dashboard
Azure Active Directory option on the Azure Dashboard

Then, click on Enterprise applications from the left sidebar.

Enterprise applications option on the Azure Dashboard
Enterprise applications option on the Azure Dashboard

If you already have an existing Azure AD SAML application, select it from the list and move on to Step 2.

If not, click on New application at the top.

Create new application button on the Azure Dashboard
Create new application button on the Azure Dashboard

In the next screen, click on Create your own application. Give your application a Name (e.g. "Sonafone") and click Create.

Create your own application option on the Azure Dashboard
Create your own application option on the Azure Dashboard

Step 2: Configure SAML Application

Under the Manage section in the left sidebar, select Single sign-on. Then, click on SAML.

SAML option on the Azure Dashboard
SAML option on the Azure Dashboard

Under the Basic SAML Configuration section, click on Edit.

Edit button on the SAML Settings page on the Azure Dashboard
Edit button on the SAML Settings page on the Azure Dashboard

This will open up a sheet overlay. Under Basic SAML Configuration, enter the following values:

Identifier (Entity ID)

https://sso.socialforge.app

Reply URL (Assertion Consumer Service URL)

https://api.socialforge.app/auth/saml/callback

Basic SAML Configuration section on the Azure Dashboard
Basic SAML Configuration section on the Azure Dashboard

Click Save in the menu bar to save your changes.

Basic SAML Configuration section on the Azure Dashboard
Basic SAML Configuration section on the Azure Dashboard

Step 3: Attribute Mapping

Click Edit on the Attributes & Claims section.

Attributes & Claims section on the Azure Dashboard
Attributes & Claims section on the Azure Dashboard

Under Additional claims, make sure the following entries are present:

NameValue
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressuser.mail
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givennameuser.givenname
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameuser.userprincipalname
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surnameuser.surname
Additional claims section on the Azure Dashboard
Additional claims section on the Azure Dashboard

Once that's done, click on the X button in the top right corner to go back to the main settings page (or click the back button in your browser).

Step 4: Copy the Metadata URL

Scroll down to the 3rd section on the page, SAML Certificates. Copy the App Federation Metadata Url value—Sonafone uses it to keep your certificate in sync.

Metadata URL on the Azure Dashboard
Metadata URL on the Azure Dashboard

Step 5: Configure SAML SSO on Sonafone

In your Sonafone workspace, open Settings → Security.

SAML SSO section on the Sonafone dashboard
SAML SSO section on the Sonafone dashboard

Under SAML Single Sign-On, click Configure. This opens the Sonafone SSO modal:

  1. Select Azure AD as the provider.
  2. Paste the App Federation Metadata URL from Azure.
  3. Save your changes.
SAML SSO Modal
SAML SSO Modal

Step 6: Assign Users

We highly recommend configuring SCIM directory sync before assigning users & groups to your project. This will ensure that your users are automatically added to your project when they sign in for the first time, as well as automatically removed when they are deactivated in Azure.

Once you've configured SAML SSO, you can start assigning users & groups to your project.

From your application, click the Users and groups from the left navigation menu and click Add user/group.

Adding users in Azure AD
Adding users in Azure AD

Click on None Selected under Users.

From the right side of the screen, select the users you want to assign to the app and click the Select button. Thenm click Assign to those users to your app.

Assigning users in Azure AD
Assigning users in Azure AD

Your assigned users should now receive an invitation email to join your Sonafone workspace.

SAML invite email
SAML invite email

Azure AD SCIM provisioning can take anywhere between 20-40 minutes to sync. This means that it may take up to 40 minutes for your users to receive the invitation email and be able to join your Sonafone workspace.

They will also be able to sign in to Sonafone using Azure AD SSO.

Was this article helpful?

Select an option to provide feedback

On this page
Step 1: Create or Select SAML ApplicationStep 2: Configure SAML ApplicationStep 3: Attribute MappingStep 4: Copy the Metadata URLStep 5: Configure SAML SSO on SonafoneStep 6: Assign Users
Found a typo? Edit this page →