<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article How to configure Qlik Sense Enterprise on-prem with Azure Entra ID as an Identity Provider (IdP) in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/How-to-configure-Qlik-Sense-Enterprise-on-prem-with-Azure-Entra/ta-p/2545782</link>
    <description>&lt;P&gt;This article documents the basic steps to configure the SAML integration between &lt;FONT color="#339966"&gt;&lt;STRONG&gt;Qlik Sense Enterprise on Windows (Client-Managed)&lt;/STRONG&gt;&lt;/FONT&gt;&amp;nbsp;and &lt;FONT color="#339966"&gt;&lt;STRONG&gt;Microsoft Entra ID&lt;/STRONG&gt;&lt;/FONT&gt;. By connecting these two platforms, administrators can control which users are allowed to access Qlik Sense directly from Entra ID, provide users with seamless single sign-on using their Microsoft accounts, and manage identities from a centralized location.&lt;/P&gt;
&lt;P&gt;If you are looking for instructions for Qlik Cloud Analytics, see &lt;A href="https://community.qlik.com/t5/Official-Support-Articles/How-To-Configure-Qlik-Sense-Enterprise-SaaS-to-use-Azure-AD-as/ta-p/1704442" target="_blank" rel="noopener"&gt;How To: Configure Qlik Sense Enterprise SaaS to use Azure AD as an IdP&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Content&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-TOC indent="15" liststyle="none" maxheadinglevel="4"&gt;&lt;/LI-TOC&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Prerequisites&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;To get started, you need the following items:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A Microsoft Entra subscription.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;A valid Qlik Sense Enterprise on Windows license.&lt;/LI&gt;
&lt;LI&gt;Along with Cloud Application Administrator, an Application Administrator can also add or manage applications in Microsoft Entra ID. For more information, see &lt;A href="https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference" target="_blank" rel="noopener"&gt;Azure built-in roles&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step One: Adding the Qlik Sense Enterprise on Windows app to your ENTRA ID.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;Sign in to the&amp;nbsp;&lt;A href="https://entra.microsoft.com/" target="_blank" rel="noopener"&gt;Microsoft Entra admin center&lt;/A&gt;&amp;nbsp;as at least a&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference#cloud-application-administrator" target="_blank" rel="noopener"&gt;Cloud Application Administrator&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Go to&amp;nbsp;&lt;STRONG&gt;Entra ID&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Enterprise Applications&amp;nbsp;&lt;/STRONG&gt;under the Manage part.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;New Application&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;In the &lt;STRONG&gt;search &lt;/STRONG&gt;box, type&amp;nbsp;&lt;EM&gt;Qlik Sense Enterprise Client-Managed&lt;/EM&gt; and select the result.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;Create &lt;/STRONG&gt;and wait for the app to be successfully added to your application list.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step Two: Assigning users to your Qlik Sense Enterprise Client-Managed app in ENTRA ID.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;Open the created&amp;nbsp;&lt;STRONG&gt;Qlik Sense Enterprise Client-Managed&amp;nbsp;&lt;/STRONG&gt;app, click on &lt;STRONG&gt;Users and groups&lt;/STRONG&gt; on the left side.&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;+ Add user/group&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;None Selected&lt;/STRONG&gt; under the Users.&lt;/LI&gt;
&lt;LI&gt;Select the user or multiple users you want to permit to access Qlik Sense, then click &lt;STRONG&gt;Select&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;Assign&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;Refresh &lt;/STRONG&gt;and verify that the target user is added with the Role assigned.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step Three: Configuring Microsoft Entra SSO&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;Open the created&amp;nbsp;&lt;STRONG&gt;Qlik Sense Enterprise Client-Managed&amp;nbsp;&lt;/STRONG&gt;app, and click &lt;STRONG&gt;Single sign-on&lt;/STRONG&gt; on the left side.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Select a Single Sign-on method&lt;/STRONG&gt;&amp;nbsp;page, select&amp;nbsp;&lt;STRONG&gt;SAML&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Set up Single Sign-On with SAML&lt;/STRONG&gt;&amp;nbsp;page, select the pencil icon for&amp;nbsp;&lt;STRONG&gt;Basic SAML Configuration&lt;/STRONG&gt; to edit the settings.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="edit basic SAML configuration.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187550iBD38AF166C7D1929/image-size/large?v=v2&amp;amp;px=999" role="button" title="edit basic SAML configuration.png" alt="edit basic SAML configuration.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;In the&amp;nbsp;&lt;STRONG&gt;Identifier (Entity ID)&lt;/STRONG&gt; textbox, type a URL using the pattern: &lt;EM&gt;https://&amp;lt;Fully Qualified Domain Name&amp;gt;.qliksense.com&lt;/EM&gt;”&lt;BR /&gt;&lt;BR /&gt;This example uses the Qlik Sense Fully Qualified Domain Name &lt;A href="https://qlikserver1.domain.local" target="_blank" rel="noopener"&gt;https://qlikserver1.domain.local&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;In the&amp;nbsp;&lt;STRONG&gt;Reply URL&lt;/STRONG&gt; textbox, type a URL using the pattern: &lt;EM&gt;https://&amp;lt;Fully Qualified Domain Name&amp;gt;:443{/virtualproxyprefix}/samlauthn/&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;This example uses &lt;A href="https://qlikserver1.domain.local:443/entrasaml/samlauthn/" target="_blank" rel="noopener"&gt;https://qlikserver1.domain.local:443/entrasaml/samlauthn/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;In the&amp;nbsp;&lt;STRONG&gt;Sign on URL&lt;/STRONG&gt; textbox, type a URL using the pattern: https://&amp;lt;Fully Qualified Domain Name&amp;gt;:443{/virtualproxyprefix}/hub&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;This example uses &lt;A href="https://qlikserver1.domain.local:443/entrasaml/hub" target="_blank" rel="noopener"&gt;https://qlikserver1.domain.local:443/entrasaml/hub&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;Save&lt;/STRONG&gt;.&lt;STRONG&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Go to the &lt;STRONG&gt;Set up Single Sign-On with SAML&lt;/STRONG&gt; page.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;In the &lt;STRONG&gt;SAML Certificate&lt;/STRONG&gt;&amp;nbsp;section, find&amp;nbsp;&lt;STRONG&gt;Federation Metadata XML&lt;/STRONG&gt;, click &lt;STRONG&gt;Download,&lt;/STRONG&gt; and save the file on your computer.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="download federation metadata xml.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187551iC17FB7D3D4D0C693/image-size/large?v=v2&amp;amp;px=999" role="button" title="download federation metadata xml.png" alt="download federation metadata xml.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;DIV id="tinyMceEditorSonja_Bauernfeind_18" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step Four: Configuring SSO Qlik Sense Enterprise client-managed virtual proxy&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;All the following steps are taken in Qlik Sense Enterprise on Windows.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Open the &lt;STRONG&gt;Qlik Sense Management Console&lt;/STRONG&gt; (&lt;STRONG&gt;QMC&lt;/STRONG&gt;) as a root admin user or a user who has permission to create a virtual proxy.&lt;/LI&gt;
&lt;LI&gt;Go to &lt;STRONG&gt;Virtual Proxies&lt;/STRONG&gt; and click &lt;STRONG&gt;Create new &lt;/STRONG&gt;(See &lt;A href="https://help.qlik.com/en-US/sense-admin/Subsystems/DeployAdministerQSE/Content/Sense_DeployAdminister/QSEoW/Administer_QSEoW/Managing_QSEoW/create-virtual-proxy.htm" target="_blank" rel="noopener"&gt;Creating a virtual proxy&lt;/A&gt; for details).&lt;/LI&gt;
&lt;LI&gt;If not already visible, activate the following &lt;STRONG&gt;Properties &lt;/STRONG&gt;in the right-side menu:&amp;nbsp;&lt;STRONG&gt;Identification&lt;/STRONG&gt;,&lt;STRONG&gt; Authentication&lt;/STRONG&gt;,&lt;STRONG&gt; Load Balancing&lt;/STRONG&gt;, and &lt;STRONG&gt;Advanced&lt;/STRONG&gt;.&lt;BR /&gt;
&lt;DIV id="tinyMceEditorSonja_Bauernfeind_19" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="create a new virtual proxy.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187553i5322E280B77208B9/image-size/large?v=v2&amp;amp;px=999" role="button" title="create a new virtual proxy.png" alt="create a new virtual proxy.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;Configure &lt;STRONG&gt;IDENTIFICATION &lt;/STRONG&gt;as follows:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Description: &lt;/STRONG&gt;Describe the purpose of the virtual proxy.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Prefix:&lt;/STRONG&gt; Enter a unique name not yet used by any other virtual proxies; this value will be a part of the login URL for &lt;STRONG&gt;Qlik Sense&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Session inactivity timeout (minutes): &lt;/STRONG&gt;Set how long a session&amp;nbsp;can remain idle before it expires; once this limit is reached, the session becomes invalid and the user is automatically signed out.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Session cookie header name:&lt;/STRONG&gt; Set a unique cookie name storing the session identifier after successful authentication.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="unique prefix and session cookie name.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187554iCD724326080B655F/image-size/large?v=v2&amp;amp;px=999" role="button" title="unique prefix and session cookie name.png" alt="unique prefix and session cookie name.png" /&gt;&lt;/span&gt;&lt;BR /&gt;
&lt;DIV id="tinyMceEditorSonja_Bauernfeind_20" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Configure &lt;STRONG&gt;AUTHENTICATION &lt;/STRONG&gt;as follows:&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Anonymous access mode:&lt;/STRONG&gt; This controls whether unauthenticated users can access Qlik Sense through this virtual proxy. The default setting is&amp;nbsp;&lt;STRONG&gt;No anonymous user&lt;/STRONG&gt;, which restricts access to authenticated users only. Leave it at the default.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Authentication method:&lt;/STRONG&gt; Select &lt;STRONG&gt;SAML &lt;/STRONG&gt;from the dropdown list, which will surface additional settings.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SAML host URI field: &lt;/STRONG&gt;Enter the hostname that users will use to access &lt;STRONG&gt;Qlik Sense&lt;/STRONG&gt; through this SAML proxy. This value should match the public URI of your Qlik Sense server.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SAML entity ID: &lt;/STRONG&gt;Use the same value configured in the &lt;STRONG&gt;SAML host URI&lt;/STRONG&gt; field.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SAML IdP metadata:&lt;/STRONG&gt; Upload the identity provider metadata file previously downloaded from &lt;STRONG&gt;Microsoft Entra ID&lt;/STRONG&gt;. Click &lt;STRONG&gt;Choose File&lt;/STRONG&gt; and select the XML metadata file.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SAML attribute user ID: &lt;/STRONG&gt;Enter the attribute name or schema reference for the SAML attribute representing the&amp;nbsp;&lt;STRONG&gt;UserID&lt;/STRONG&gt;&amp;nbsp;Microsoft Entra ID sends to the Qlik Sense server. Schema reference information is available in the Azure app screens post configuration. To use the name attribute, enter&amp;nbsp;&lt;EM&gt;&lt;A href="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name" target="_blank" rel="noopener"&gt;http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name&lt;/A&gt;&lt;/EM&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SAML attribute for user directory: &lt;/STRONG&gt;Enter the value for the&amp;nbsp;&lt;STRONG&gt;user directory&lt;/STRONG&gt;&amp;nbsp;that's attached to users when they authenticate to Qlik Sense server through Microsoft Entra ID. Hardcoded values must be surrounded by&amp;nbsp;&lt;STRONG&gt;square brackets []&lt;/STRONG&gt;. To use an attribute sent in the Microsoft Entra SAML assertion, enter the name of the attribute in this text box&amp;nbsp;&lt;STRONG&gt;without&lt;/STRONG&gt; square brackets. In this example, we are using&lt;EM&gt; [domain]&lt;/EM&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SAML signing algorithm:&lt;/STRONG&gt; Defines the certificate signing algorithm used by the service provider (Qlik Sense server). If your server uses a trusted certificate generated with Microsoft Enhanced RSA and AES Cryptographic Provider, consider changing the algorithm to &lt;STRONG&gt;SHA-256&lt;/STRONG&gt;. In this example, &lt;STRONG&gt;SHA-1&lt;/STRONG&gt; is used.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SAML attribute mapping&lt;/STRONG&gt;: Allows additional attributes (such as groups) to be passed to Qlik Sense for use in security rules. In this example, no additional attribute mapping is configured.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="configure authentication.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187556i81A4990BDB31CB5D/image-size/large?v=v2&amp;amp;px=999" role="button" title="configure authentication.png" alt="configure authentication.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Configure &lt;STRONG&gt;LOAD BALANCING&lt;/STRONG&gt; as follows:&lt;BR /&gt;
&lt;OL class="lia-list-style-type-lower-alpha"&gt;
&lt;LI&gt;Click &lt;STRONG&gt;Add new server node&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Then select the engine node (or nodes) that&amp;nbsp;&lt;STRONG&gt;Qlik Sense&lt;/STRONG&gt; should route user sessions to for load balancing and click &lt;STRONG&gt;Add&lt;/STRONG&gt; to confirm your selection.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="add central proxy.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187557i8C3638C35E54C406/image-size/large?v=v2&amp;amp;px=999" role="button" title="add central proxy.png" alt="add central proxy.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;LI&gt;Configure ADVANCED as follows:&lt;BR /&gt;&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Host allow list:&lt;/STRONG&gt; Define all hostnames that are permitted when connecting to the&amp;nbsp;&lt;STRONG&gt;Qlik Sense&lt;/STRONG&gt; server. Enter the hostname users will use to access the server.&lt;BR /&gt;&lt;BR /&gt;This value should match the &lt;STRONG&gt;SAML host URI&lt;/STRONG&gt;, but &lt;EM&gt;without&lt;/EM&gt; the https:// prefix.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="add host allow list.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187558i7B7FE3BBFD1AB186/image-size/large?v=v2&amp;amp;px=999" role="button" title="add host allow list.png" alt="add host allow list.png" /&gt;&lt;/span&gt;&lt;BR /&gt;
&lt;DIV id="tinyMceEditorSonja_Bauernfeind_23" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;Leave the other settings at their default values&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;Apply&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="click apply.png" style="width: 283px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187559i860AA9993D1F1663/image-dimensions/283x91?v=v2" width="283" height="91" role="button" title="click apply.png" alt="click apply.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;The Proxy will be restarted. Click &lt;STRONG&gt;OK &lt;/STRONG&gt;to confirm.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="restart required.png" style="width: 421px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187560iF37B64D3DE68E447/image-dimensions/421x319?v=v2" width="421" height="319" role="button" title="restart required.png" alt="restart required.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;After the restart, locate the &lt;STRONG&gt;Associated items &lt;/STRONG&gt;section in the menu and click &lt;STRONG&gt;Proxies&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="associated items proxies.png" style="width: 242px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187561i6B0759AA855E234C/image-dimensions/242x538?v=v2" width="242" height="538" role="button" title="associated items proxies.png" alt="associated items proxies.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Select the proxy node that will handle this virtual proxy connection in&amp;nbsp;&lt;STRONG&gt;Qlik Sense&lt;/STRONG&gt;, then click &lt;STRONG&gt;Link&lt;/STRONG&gt;. Once the connection is established, the proxy node will appear in the list of associated proxies.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="link.png" style="width: 535px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187563i99B6AEFCCE601123/image-dimensions/535x114?v=v2" width="535" height="114" role="button" title="link.png" alt="link.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="linked proxy.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187564i11A9DB7E9E729B38/image-size/large?v=v2&amp;amp;px=999" role="button" title="linked proxy.png" alt="linked proxy.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;A &lt;STRONG&gt;Refresh QMC &lt;/STRONG&gt;prompt appears. Click to confirm. Once the page reloads, open the &lt;STRONG&gt;Virtual proxies&lt;/STRONG&gt; section and locate the newly created SAML virtual proxy in the list.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Select the entry, and the&amp;nbsp;&lt;STRONG&gt;Download SP metadata&lt;/STRONG&gt; button at the bottom of the screen will become active. Click this button to download and save the service provider metadata file for &lt;STRONG&gt;Qlik Sense&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="download sp metadata.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187565i3238D3D18AD11DBC/image-size/large?v=v2&amp;amp;px=999" role="button" title="download sp metadata.png" alt="download sp metadata.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Open the &lt;STRONG&gt;SP metadata file&lt;/STRONG&gt; and review the &lt;STRONG&gt;entityID &lt;/STRONG&gt;and &lt;STRONG&gt;AssertionConsumerService &lt;/STRONG&gt;entries. These correspond to the &lt;STRONG&gt;Identifier &lt;/STRONG&gt;and &lt;STRONG&gt;Reply URL&lt;/STRONG&gt; fields in the&lt;STRONG&gt; Microsoft Entra ID application configuration&lt;/STRONG&gt;. If the values in Entra ID do not match those in the metadata file, update the Domain and URLs section of the application configuration so they are aligned with the settings from Qlik Sense.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sp metadata file content.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187566i02F2000C686DFDA2/image-size/large?v=v2&amp;amp;px=999" role="button" title="sp metadata file content.png" alt="sp metadata file content.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="basic saml configuration.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187567i2BFDE08FEDDB1CE2/image-size/large?v=v2&amp;amp;px=999" role="button" title="basic saml configuration.png" alt="basic saml configuration.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step Five: Testing SSO.&lt;/STRONG&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;You can test the single sign-on setup either from the &lt;STRONG&gt;Microsoft Entra ID&lt;/STRONG&gt; portal by selecting &lt;STRONG&gt;Test&lt;/STRONG&gt;, or by navigating directly to the &lt;STRONG&gt;Qlik Sense&lt;/STRONG&gt; sign-on URL and starting the login process from there.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="test the connection.png" style="width: 708px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187570iB0173F74BC1977DB/image-dimensions/708x563?v=v2" width="708" height="563" role="button" title="test the connection.png" alt="test the connection.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="test in the hub.png" style="width: 619px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187573i5CEF410F6F35B890/image-dimensions/619x261?v=v2" width="619" height="261" role="button" title="test in the hub.png" alt="test in the hub.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 31 Mar 2026 11:00:05 GMT</pubDate>
    <dc:creator>Jack_Guo</dc:creator>
    <dc:date>2026-03-31T11:00:05Z</dc:date>
    <item>
      <title>How to configure Qlik Sense Enterprise on-prem with Azure Entra ID as an Identity Provider (IdP)</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/How-to-configure-Qlik-Sense-Enterprise-on-prem-with-Azure-Entra/ta-p/2545782</link>
      <description>&lt;P&gt;This article documents the basic steps to configure the SAML integration between &lt;FONT color="#339966"&gt;&lt;STRONG&gt;Qlik Sense Enterprise on Windows (Client-Managed)&lt;/STRONG&gt;&lt;/FONT&gt;&amp;nbsp;and &lt;FONT color="#339966"&gt;&lt;STRONG&gt;Microsoft Entra ID&lt;/STRONG&gt;&lt;/FONT&gt;. By connecting these two platforms, administrators can control which users are allowed to access Qlik Sense directly from Entra ID, provide users with seamless single sign-on using their Microsoft accounts, and manage identities from a centralized location.&lt;/P&gt;
&lt;P&gt;If you are looking for instructions for Qlik Cloud Analytics, see &lt;A href="https://community.qlik.com/t5/Official-Support-Articles/How-To-Configure-Qlik-Sense-Enterprise-SaaS-to-use-Azure-AD-as/ta-p/1704442" target="_blank" rel="noopener"&gt;How To: Configure Qlik Sense Enterprise SaaS to use Azure AD as an IdP&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Content&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-TOC indent="15" liststyle="none" maxheadinglevel="4"&gt;&lt;/LI-TOC&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Prerequisites&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;To get started, you need the following items:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A Microsoft Entra subscription.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;A valid Qlik Sense Enterprise on Windows license.&lt;/LI&gt;
&lt;LI&gt;Along with Cloud Application Administrator, an Application Administrator can also add or manage applications in Microsoft Entra ID. For more information, see &lt;A href="https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference" target="_blank" rel="noopener"&gt;Azure built-in roles&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step One: Adding the Qlik Sense Enterprise on Windows app to your ENTRA ID.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;Sign in to the&amp;nbsp;&lt;A href="https://entra.microsoft.com/" target="_blank" rel="noopener"&gt;Microsoft Entra admin center&lt;/A&gt;&amp;nbsp;as at least a&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference#cloud-application-administrator" target="_blank" rel="noopener"&gt;Cloud Application Administrator&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Go to&amp;nbsp;&lt;STRONG&gt;Entra ID&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Select &lt;STRONG&gt;Enterprise Applications&amp;nbsp;&lt;/STRONG&gt;under the Manage part.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;New Application&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;In the &lt;STRONG&gt;search &lt;/STRONG&gt;box, type&amp;nbsp;&lt;EM&gt;Qlik Sense Enterprise Client-Managed&lt;/EM&gt; and select the result.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;Create &lt;/STRONG&gt;and wait for the app to be successfully added to your application list.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step Two: Assigning users to your Qlik Sense Enterprise Client-Managed app in ENTRA ID.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;Open the created&amp;nbsp;&lt;STRONG&gt;Qlik Sense Enterprise Client-Managed&amp;nbsp;&lt;/STRONG&gt;app, click on &lt;STRONG&gt;Users and groups&lt;/STRONG&gt; on the left side.&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;+ Add user/group&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;None Selected&lt;/STRONG&gt; under the Users.&lt;/LI&gt;
&lt;LI&gt;Select the user or multiple users you want to permit to access Qlik Sense, then click &lt;STRONG&gt;Select&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;Assign&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;Refresh &lt;/STRONG&gt;and verify that the target user is added with the Role assigned.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step Three: Configuring Microsoft Entra SSO&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;Open the created&amp;nbsp;&lt;STRONG&gt;Qlik Sense Enterprise Client-Managed&amp;nbsp;&lt;/STRONG&gt;app, and click &lt;STRONG&gt;Single sign-on&lt;/STRONG&gt; on the left side.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Select a Single Sign-on method&lt;/STRONG&gt;&amp;nbsp;page, select&amp;nbsp;&lt;STRONG&gt;SAML&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;On the&amp;nbsp;&lt;STRONG&gt;Set up Single Sign-On with SAML&lt;/STRONG&gt;&amp;nbsp;page, select the pencil icon for&amp;nbsp;&lt;STRONG&gt;Basic SAML Configuration&lt;/STRONG&gt; to edit the settings.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="edit basic SAML configuration.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187550iBD38AF166C7D1929/image-size/large?v=v2&amp;amp;px=999" role="button" title="edit basic SAML configuration.png" alt="edit basic SAML configuration.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;In the&amp;nbsp;&lt;STRONG&gt;Identifier (Entity ID)&lt;/STRONG&gt; textbox, type a URL using the pattern: &lt;EM&gt;https://&amp;lt;Fully Qualified Domain Name&amp;gt;.qliksense.com&lt;/EM&gt;”&lt;BR /&gt;&lt;BR /&gt;This example uses the Qlik Sense Fully Qualified Domain Name &lt;A href="https://qlikserver1.domain.local" target="_blank" rel="noopener"&gt;https://qlikserver1.domain.local&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;In the&amp;nbsp;&lt;STRONG&gt;Reply URL&lt;/STRONG&gt; textbox, type a URL using the pattern: &lt;EM&gt;https://&amp;lt;Fully Qualified Domain Name&amp;gt;:443{/virtualproxyprefix}/samlauthn/&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;This example uses &lt;A href="https://qlikserver1.domain.local:443/entrasaml/samlauthn/" target="_blank" rel="noopener"&gt;https://qlikserver1.domain.local:443/entrasaml/samlauthn/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;In the&amp;nbsp;&lt;STRONG&gt;Sign on URL&lt;/STRONG&gt; textbox, type a URL using the pattern: https://&amp;lt;Fully Qualified Domain Name&amp;gt;:443{/virtualproxyprefix}/hub&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;This example uses &lt;A href="https://qlikserver1.domain.local:443/entrasaml/hub" target="_blank" rel="noopener"&gt;https://qlikserver1.domain.local:443/entrasaml/hub&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Click &lt;STRONG&gt;Save&lt;/STRONG&gt;.&lt;STRONG&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Go to the &lt;STRONG&gt;Set up Single Sign-On with SAML&lt;/STRONG&gt; page.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;In the &lt;STRONG&gt;SAML Certificate&lt;/STRONG&gt;&amp;nbsp;section, find&amp;nbsp;&lt;STRONG&gt;Federation Metadata XML&lt;/STRONG&gt;, click &lt;STRONG&gt;Download,&lt;/STRONG&gt; and save the file on your computer.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="download federation metadata xml.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187551iC17FB7D3D4D0C693/image-size/large?v=v2&amp;amp;px=999" role="button" title="download federation metadata xml.png" alt="download federation metadata xml.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;DIV id="tinyMceEditorSonja_Bauernfeind_18" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step Four: Configuring SSO Qlik Sense Enterprise client-managed virtual proxy&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;All the following steps are taken in Qlik Sense Enterprise on Windows.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Open the &lt;STRONG&gt;Qlik Sense Management Console&lt;/STRONG&gt; (&lt;STRONG&gt;QMC&lt;/STRONG&gt;) as a root admin user or a user who has permission to create a virtual proxy.&lt;/LI&gt;
&lt;LI&gt;Go to &lt;STRONG&gt;Virtual Proxies&lt;/STRONG&gt; and click &lt;STRONG&gt;Create new &lt;/STRONG&gt;(See &lt;A href="https://help.qlik.com/en-US/sense-admin/Subsystems/DeployAdministerQSE/Content/Sense_DeployAdminister/QSEoW/Administer_QSEoW/Managing_QSEoW/create-virtual-proxy.htm" target="_blank" rel="noopener"&gt;Creating a virtual proxy&lt;/A&gt; for details).&lt;/LI&gt;
&lt;LI&gt;If not already visible, activate the following &lt;STRONG&gt;Properties &lt;/STRONG&gt;in the right-side menu:&amp;nbsp;&lt;STRONG&gt;Identification&lt;/STRONG&gt;,&lt;STRONG&gt; Authentication&lt;/STRONG&gt;,&lt;STRONG&gt; Load Balancing&lt;/STRONG&gt;, and &lt;STRONG&gt;Advanced&lt;/STRONG&gt;.&lt;BR /&gt;
&lt;DIV id="tinyMceEditorSonja_Bauernfeind_19" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="create a new virtual proxy.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187553i5322E280B77208B9/image-size/large?v=v2&amp;amp;px=999" role="button" title="create a new virtual proxy.png" alt="create a new virtual proxy.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;Configure &lt;STRONG&gt;IDENTIFICATION &lt;/STRONG&gt;as follows:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Description: &lt;/STRONG&gt;Describe the purpose of the virtual proxy.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Prefix:&lt;/STRONG&gt; Enter a unique name not yet used by any other virtual proxies; this value will be a part of the login URL for &lt;STRONG&gt;Qlik Sense&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Session inactivity timeout (minutes): &lt;/STRONG&gt;Set how long a session&amp;nbsp;can remain idle before it expires; once this limit is reached, the session becomes invalid and the user is automatically signed out.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Session cookie header name:&lt;/STRONG&gt; Set a unique cookie name storing the session identifier after successful authentication.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="unique prefix and session cookie name.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187554iCD724326080B655F/image-size/large?v=v2&amp;amp;px=999" role="button" title="unique prefix and session cookie name.png" alt="unique prefix and session cookie name.png" /&gt;&lt;/span&gt;&lt;BR /&gt;
&lt;DIV id="tinyMceEditorSonja_Bauernfeind_20" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Configure &lt;STRONG&gt;AUTHENTICATION &lt;/STRONG&gt;as follows:&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Anonymous access mode:&lt;/STRONG&gt; This controls whether unauthenticated users can access Qlik Sense through this virtual proxy. The default setting is&amp;nbsp;&lt;STRONG&gt;No anonymous user&lt;/STRONG&gt;, which restricts access to authenticated users only. Leave it at the default.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Authentication method:&lt;/STRONG&gt; Select &lt;STRONG&gt;SAML &lt;/STRONG&gt;from the dropdown list, which will surface additional settings.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SAML host URI field: &lt;/STRONG&gt;Enter the hostname that users will use to access &lt;STRONG&gt;Qlik Sense&lt;/STRONG&gt; through this SAML proxy. This value should match the public URI of your Qlik Sense server.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SAML entity ID: &lt;/STRONG&gt;Use the same value configured in the &lt;STRONG&gt;SAML host URI&lt;/STRONG&gt; field.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SAML IdP metadata:&lt;/STRONG&gt; Upload the identity provider metadata file previously downloaded from &lt;STRONG&gt;Microsoft Entra ID&lt;/STRONG&gt;. Click &lt;STRONG&gt;Choose File&lt;/STRONG&gt; and select the XML metadata file.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SAML attribute user ID: &lt;/STRONG&gt;Enter the attribute name or schema reference for the SAML attribute representing the&amp;nbsp;&lt;STRONG&gt;UserID&lt;/STRONG&gt;&amp;nbsp;Microsoft Entra ID sends to the Qlik Sense server. Schema reference information is available in the Azure app screens post configuration. To use the name attribute, enter&amp;nbsp;&lt;EM&gt;&lt;A href="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name" target="_blank" rel="noopener"&gt;http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name&lt;/A&gt;&lt;/EM&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SAML attribute for user directory: &lt;/STRONG&gt;Enter the value for the&amp;nbsp;&lt;STRONG&gt;user directory&lt;/STRONG&gt;&amp;nbsp;that's attached to users when they authenticate to Qlik Sense server through Microsoft Entra ID. Hardcoded values must be surrounded by&amp;nbsp;&lt;STRONG&gt;square brackets []&lt;/STRONG&gt;. To use an attribute sent in the Microsoft Entra SAML assertion, enter the name of the attribute in this text box&amp;nbsp;&lt;STRONG&gt;without&lt;/STRONG&gt; square brackets. In this example, we are using&lt;EM&gt; [domain]&lt;/EM&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SAML signing algorithm:&lt;/STRONG&gt; Defines the certificate signing algorithm used by the service provider (Qlik Sense server). If your server uses a trusted certificate generated with Microsoft Enhanced RSA and AES Cryptographic Provider, consider changing the algorithm to &lt;STRONG&gt;SHA-256&lt;/STRONG&gt;. In this example, &lt;STRONG&gt;SHA-1&lt;/STRONG&gt; is used.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SAML attribute mapping&lt;/STRONG&gt;: Allows additional attributes (such as groups) to be passed to Qlik Sense for use in security rules. In this example, no additional attribute mapping is configured.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="configure authentication.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187556i81A4990BDB31CB5D/image-size/large?v=v2&amp;amp;px=999" role="button" title="configure authentication.png" alt="configure authentication.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Configure &lt;STRONG&gt;LOAD BALANCING&lt;/STRONG&gt; as follows:&lt;BR /&gt;
&lt;OL class="lia-list-style-type-lower-alpha"&gt;
&lt;LI&gt;Click &lt;STRONG&gt;Add new server node&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Then select the engine node (or nodes) that&amp;nbsp;&lt;STRONG&gt;Qlik Sense&lt;/STRONG&gt; should route user sessions to for load balancing and click &lt;STRONG&gt;Add&lt;/STRONG&gt; to confirm your selection.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="add central proxy.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187557i8C3638C35E54C406/image-size/large?v=v2&amp;amp;px=999" role="button" title="add central proxy.png" alt="add central proxy.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;LI&gt;Configure ADVANCED as follows:&lt;BR /&gt;&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Host allow list:&lt;/STRONG&gt; Define all hostnames that are permitted when connecting to the&amp;nbsp;&lt;STRONG&gt;Qlik Sense&lt;/STRONG&gt; server. Enter the hostname users will use to access the server.&lt;BR /&gt;&lt;BR /&gt;This value should match the &lt;STRONG&gt;SAML host URI&lt;/STRONG&gt;, but &lt;EM&gt;without&lt;/EM&gt; the https:// prefix.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="add host allow list.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187558i7B7FE3BBFD1AB186/image-size/large?v=v2&amp;amp;px=999" role="button" title="add host allow list.png" alt="add host allow list.png" /&gt;&lt;/span&gt;&lt;BR /&gt;
&lt;DIV id="tinyMceEditorSonja_Bauernfeind_23" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;Leave the other settings at their default values&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Click&amp;nbsp;&lt;STRONG&gt;Apply&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="click apply.png" style="width: 283px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187559i860AA9993D1F1663/image-dimensions/283x91?v=v2" width="283" height="91" role="button" title="click apply.png" alt="click apply.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;The Proxy will be restarted. Click &lt;STRONG&gt;OK &lt;/STRONG&gt;to confirm.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="restart required.png" style="width: 421px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187560iF37B64D3DE68E447/image-dimensions/421x319?v=v2" width="421" height="319" role="button" title="restart required.png" alt="restart required.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;After the restart, locate the &lt;STRONG&gt;Associated items &lt;/STRONG&gt;section in the menu and click &lt;STRONG&gt;Proxies&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="associated items proxies.png" style="width: 242px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187561i6B0759AA855E234C/image-dimensions/242x538?v=v2" width="242" height="538" role="button" title="associated items proxies.png" alt="associated items proxies.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Select the proxy node that will handle this virtual proxy connection in&amp;nbsp;&lt;STRONG&gt;Qlik Sense&lt;/STRONG&gt;, then click &lt;STRONG&gt;Link&lt;/STRONG&gt;. Once the connection is established, the proxy node will appear in the list of associated proxies.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="link.png" style="width: 535px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187563i99B6AEFCCE601123/image-dimensions/535x114?v=v2" width="535" height="114" role="button" title="link.png" alt="link.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="linked proxy.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187564i11A9DB7E9E729B38/image-size/large?v=v2&amp;amp;px=999" role="button" title="linked proxy.png" alt="linked proxy.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;A &lt;STRONG&gt;Refresh QMC &lt;/STRONG&gt;prompt appears. Click to confirm. Once the page reloads, open the &lt;STRONG&gt;Virtual proxies&lt;/STRONG&gt; section and locate the newly created SAML virtual proxy in the list.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Select the entry, and the&amp;nbsp;&lt;STRONG&gt;Download SP metadata&lt;/STRONG&gt; button at the bottom of the screen will become active. Click this button to download and save the service provider metadata file for &lt;STRONG&gt;Qlik Sense&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="download sp metadata.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187565i3238D3D18AD11DBC/image-size/large?v=v2&amp;amp;px=999" role="button" title="download sp metadata.png" alt="download sp metadata.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Open the &lt;STRONG&gt;SP metadata file&lt;/STRONG&gt; and review the &lt;STRONG&gt;entityID &lt;/STRONG&gt;and &lt;STRONG&gt;AssertionConsumerService &lt;/STRONG&gt;entries. These correspond to the &lt;STRONG&gt;Identifier &lt;/STRONG&gt;and &lt;STRONG&gt;Reply URL&lt;/STRONG&gt; fields in the&lt;STRONG&gt; Microsoft Entra ID application configuration&lt;/STRONG&gt;. If the values in Entra ID do not match those in the metadata file, update the Domain and URLs section of the application configuration so they are aligned with the settings from Qlik Sense.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sp metadata file content.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187566i02F2000C686DFDA2/image-size/large?v=v2&amp;amp;px=999" role="button" title="sp metadata file content.png" alt="sp metadata file content.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="basic saml configuration.png" style="width: 999px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187567i2BFDE08FEDDB1CE2/image-size/large?v=v2&amp;amp;px=999" role="button" title="basic saml configuration.png" alt="basic saml configuration.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Step Five: Testing SSO.&lt;/STRONG&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;You can test the single sign-on setup either from the &lt;STRONG&gt;Microsoft Entra ID&lt;/STRONG&gt; portal by selecting &lt;STRONG&gt;Test&lt;/STRONG&gt;, or by navigating directly to the &lt;STRONG&gt;Qlik Sense&lt;/STRONG&gt; sign-on URL and starting the login process from there.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="test the connection.png" style="width: 708px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187570iB0173F74BC1977DB/image-dimensions/708x563?v=v2" width="708" height="563" role="button" title="test the connection.png" alt="test the connection.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="test in the hub.png" style="width: 619px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/187573i5CEF410F6F35B890/image-dimensions/619x261?v=v2" width="619" height="261" role="button" title="test in the hub.png" alt="test in the hub.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2026 11:00:05 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/How-to-configure-Qlik-Sense-Enterprise-on-prem-with-Azure-Entra/ta-p/2545782</guid>
      <dc:creator>Jack_Guo</dc:creator>
      <dc:date>2026-03-31T11:00:05Z</dc:date>
    </item>
  </channel>
</rss>

