SAML & SCIM
Setting up SAML and SCIM allows you to authenticate users using your identity provider.
This feature is available under Enterprise Edition. Configuration is set from Instance settings
SAML
The entity ID is windmill
ACS Url is <instance_url>/api/saml/acs
SCIM connector is <instance_url>/api/scim
Application username format is Email

In the Instance settings UI, pass the SAML Metadata URL (or content) containing the metadata URL (or XML content).
You can control the entity ID using the SAML_AUDIENCE environment variable. This can be useful if you want to use the same identity provider for multiple instances (e.g dev / prod).
Okta
Configure Okta with the following settings (and replace cf.wimill.xyz with your domain):


In the Instance settings UI, pass the SAML Metadata URL (or content) containing the metadata URL (or XML content).

Microsoft Entra (Azure)
In the Azure portal, go to "Enterprise Applications" and create a new one of type "Non-gallery".


Once the application is created, in the application's page go to "Single sign-on" on the left menu, and click on the "SAML" button.

Edit the configuration to set the Entity ID to windmill and the ACS url to <instance_url>/api/saml/acs.


Configuring the NameID claim
For SAML authentication to work correctly with Entra, you need to configure the primary NameIdentifier claim. In the "Attributes & Claims" section of your SAML configuration:
- Click on the NameIdentifier claim to edit it
- Set the following values:
- Name identifier format: Email address
- Source attribute:
user.mail
