Summary / When to Use This
You can connect OnRamp to your organization’s Azure Active Directory (AD) to give your team a seamless, secure sign-in experience. Once enabled, users can sign in with their existing Azure credentials instead of managing a separate OnRamp password.
Before You Begin
SSO is an add-on feature. Contact your Customer Success Manager or email support@onramp.us to enable it.
You’ll need Owner permissions in OnRamp and admin rights in Azure AD.
Users must have a valid OnRamp account with the same email address as their Azure AD account.
Only SP-initiated login is supported. Users must log in via app.onramp.us, not directly through Azure.
Steps to Follow
1. Navigate to SSO Settings in OnRamp
In OnRamp, go to Settings > SSO.
Toggle on Enforce SAML SSO.
Copy the Assertion Consumer Service URL and SAML Entity ID (you’ll need these in Azure).
2. Create a New Enterprise Application in Azure
In the Azure portal, go to Azure Active Directory.
Click Enterprise Applications in the sidebar.
Select New Application.
Choose Create your own application.
Enter a name (e.g.,
OnRamp SAML SSO
).Select Integrate any other application you don’t find in the gallery (Non-gallery).
Click Create.
3. Configure SAML SSO in Azure
Open your new application.
Under Set up single sign on, click Get Started.
Select SAML as the SSO method.
In the Basic SAML Configuration section, click Edit.
Enter the values from OnRamp:
Identifier (Entity ID) → paste the OnRamp Entity ID
Reply URL (Assertion Consumer Service URL) → paste the OnRamp ACS URL
Click Save.
4. Connect Azure Back to OnRamp
In Azure, scroll to the SAML Signing Certificate section.
Copy the App Federation Metadata URL.
Return to OnRamp.
Paste the URL into the SAML Metadata URL field.
Click Enable SAML SSO.
After a moment, you’ll see a success notification in OnRamp confirming SAML is active.
5. Add Users to Azure and OnRamp
Assign users to the OnRamp SSO application in Azure.
Make sure each user also has an OnRamp account with the same email address.
Tips & Troubleshooting
If users can’t log in, confirm:
Their OnRamp email matches their Azure AD email.
They’re logging in at app.onramp.us (not via Azure).
The SAML Metadata URL was copied correctly.
Still stuck? Reach out to support@onramp.us with screenshots of your Azure setup.