This guide covers both the Mojob setup and the Azure setup, so you can complete the integration from start to finish.
Prerequisites
Before starting, make sure you have:
Access to your Mojob Business account.
Admin rights in your Microsoft Entra ID (Azure AD) portal.
Part 1 – Configure SAML in Mojob
Log in to Mojob Business
→ https://business.mojob.ioOpen the Integrations tab
Copy Mojob SAML values
You’ll need these for the Azure setup later:Audience URI (SP Entity ID)
Reply URL (Assertion Consumer Service URL)
Login URL (Single Sign-On Service URL)
Logout URL (Single Logout Service URL)
Complete Mojob setup fields
Name → Display name for this SSO connection.
Provider ID & Client ID → Auto-generated by Mojob.
Domains → Enter your company email domain(s) (e.g.,
company.com
).
⚠ Domains determine which login emails route to this SSO provider.Identity Provider Issuer → copy from Azure AD.
App Federation Metadata URL → copy from Azure AD.
(Optional) Advanced settings -> adjust attribute mappings here
Mojob uses these defaults:Email →
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
First Name →
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
Last Name →
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname
Update only if your IdP uses different attributes.
Part 2 – Configure SAML in Microsoft Entra ID
Log in to the Azure Portal
→ https://portal.azure.comCreate a new Enterprise Application
Go to Microsoft Entra ID → Enterprise Applications.
Click New application → Create your own application.
Choose Non-gallery application.
Name it (e.g., Mojob SSO).
Assign users or groups
Configure SAML-based SSO
Set user attributes & claims
Ensure these claims are configured:emailaddress
→ User’s emailgivenname
→ User’s first namesurname
→ User’s last name
[Screenshot placeholder]
Copy certificate details
Complete Mojob configuration
Part 3 – Test the SSO Login
Go to https://business.mojob.io.
Click Continue with SSO.
Enter your full work email address.
Mojob will detect the SSO provider based on the domain.
You’ll be redirected to Microsoft Entra ID to log in.
Part 4 – User Approval Flow
On first login, users will see “Access is pending”.
A unit administrator will receive an email and in-app notification to approve them:
Once access is granted, the user will receive a confirmation email. By clicking the link in that email, they’ll be taken directly to their Mojob account.
Part 5 – View SAML Connection in Profile
Once approved: