Single Sign-On (SSO) allows team members to sign in to Sync using their corporate credentials instead of a separate username and password.
Requirements and notes
- You must be a Sync Administrator user.
- You must be an Azure Active Directory administrator.
- SSO must be configured by a net2phone administrator.
- SSO is configured at the organization level using identity provider (IdP) details.
- Azure SSO uses SAML (Security Assertion Markup Language) authentication.
Step 1: Create an enterprise application in Azure
You must be an Azure administrator to configure enterprise applications.
- Sign in to the Azure portal.
- Select Azure Active Directory.

- Select Enterprise applications.
- Click New application.

- Click Create your own application.
- Enter a name for the application (for example, net2phone).

- Select Integrate any other application you don't find in the gallery.
- Click Create.

Step 2: Enable SAML single sign-on
- Open the application you created.
- Select Get started from the Single sign-on block.

- Select SAML.

Step 3: Configure Basic SAML settings
- In the Basic SAML Configuration section, click Edit.

- Enter the following values:
-
Identifier (Entity ID)
Enter a unique value (for example, N2P). -
Reply URL (ACS URL)
https://auth.net2phone.com/saml/login/callback
-
Identifier (Entity ID)
- Click Save.

Step 4: Collect Azure SAML details
You will need the following values from the Azure SAML configuration screen:
- Login URL
- Azure AD Identifier
- Logout URL
- Certificate (Base64)
- In the SAML Signing Certificate section, click Download next to Certificate (Base64).
- Save the certificate file to your computer.
- Keep the Login URL, Azure AD Identifier, and Logout URL available for the next step.

Step 5: Configure SSO in net2phone Sync
Now that you have configured Azure, you can configure SSO in the Sync Settings Portal.
- Open app.net2phone.com and sign in with Admin credentials.
- Click your profile icon in the top right corner.
- Select Admin Settings.
- Select Single Sign On from the right navigation menu.
- Enable the Single Sign-On toggle.

- Enter the Login URL from Azure.
- Enter the Logout URL from Azure.
- Enter the Azure AD Identifier as the Entity ID.
- Paste the Public Certificate you downloaded earlier.
Step 6: Test and enable SSO
- Click Test Configuration.
- Sign in using your Azure credentials when prompted.
- Confirm that authentication is successful.
- Click Submit to save and enable SSO.

Quick tips and troubleshooting
- Ensure the Reply URL (ACS URL) is entered exactly as shown.
- Confirm users are assigned to the Azure application.
- Verify the certificate is current and not expired.
- Use Test Configuration before enabling SSO for all users.