Configure Retail Zipline for Single sign-on with Microsoft Entra ID
05/20/2025
In this article, you learn how to integrate Retail Zipline with Microsoft Entra ID. When you integrate Retail Zipline with Microsoft Entra ID, you can:
Control in Microsoft Entra ID who has access to Retail Zipline.
Enable your users to be automatically signed-in to Retail Zipline with their Microsoft Entra accounts.
Manage your accounts in one central location.
Prerequisites
The scenario outlined in this article assumes that you already have the following prerequisites:
A Microsoft Entra user account with an active subscription. If you don't already have one, you can Create an account for free.
Retail Zipline single sign-on (SSO) enabled subscription.
Scenario description
In this article, you configure and test Microsoft Entra SSO in a test environment.
Retail Zipline supports SP and IDP initiated SSO
Retail Zipline supports Just In Time user provisioning
Adding Retail Zipline from the gallery
To configure the integration of Retail Zipline into Microsoft Entra ID, you need to add Retail Zipline from the gallery to your list of managed SaaS apps.
Configure and test Microsoft Entra SSO for Retail Zipline
Configure and test Microsoft Entra SSO with Retail Zipline using a test user called B.Simon. For SSO to work, you need to establish a link relationship between a Microsoft Entra user and the related user in Retail Zipline.
To configure and test Microsoft Entra SSO with Retail Zipline, perform the following steps:
Browse to Entra ID > Enterprise apps > Retail Zipline > Single sign-on.
On the Select a single sign-on method page, select SAML.
On the Set up single sign-on with SAML page, select the edit/pen icon for Basic SAML Configuration to edit the settings.
On the Basic SAML Configuration section, if you wish to configure the application in IDP initiated mode, enter the values for the following fields:
a. In the Identifier text box, type a URL using the following pattern:
https://<SUBDOMAIN>.retailzipline.com
b. In the Reply URL text box, type a URL using the following pattern:
https://<SUBDOMAIN>.retailzipline.com/sso/saml
Select Set additional URLs and perform the following step if you wish to configure the application in SP initiated mode:
In the Sign-on URL text box, type a URL using the following pattern:
https://<SUBDOMAIN>.retailzipline.com
Note
These values aren't real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact Retail Zipline Client support team to get these values. You can also refer to the patterns shown in the Basic SAML Configuration section.
Retail Zipline application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
In addition to above, Retail Zipline application expects few more attributes to be passed back in SAML response, which are shown below. These attributes are also pre populated but you can review them as per your requirements.
Name
Source Attribute
employee_number
user.employeeid
email
user.mail
family_name
user.surname
given_name
user.givenname
title
user.jobtitle
cost_center
user.department
locale
user.preferredlanguage
On the Set up single sign-on with SAML page, In the SAML Signing Certificate section, select copy button to copy App Federation Metadata Url and save it on your computer.
To configure single sign-on on Retail Zipline side, you need to send the App Federation Metadata Url to Retail Zipline support team. They set this setting to have the SAML SSO connection set properly on both sides.
Create Retail Zipline test user
In this section, a user called Britta Simon is created in Retail Zipline. Retail Zipline supports just-in-time user provisioning, which is enabled by default. There's no action item for you in this section. If a user doesn't already exist in Retail Zipline, a new one is created after authentication.
Test SSO
In this section, you test your Microsoft Entra single sign-on configuration with following options.
SP initiated:
Select Test this application, this option redirects to Retail Zipline Sign on URL where you can initiate the login flow.
Go to Retail Zipline Sign-on URL directly and initiate the login flow from there.
IDP initiated:
Select Test this application, and you should be automatically signed in to the Retail Zipline for which you set up the SSO
You can also use Microsoft Access Panel to test the application in any mode. When you select the Retail Zipline tile in the Access Panel, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Retail Zipline for which you set up the SSO. For more information about the Access Panel, see Introduction to the Access Panel.
Discover how Microsoft Entra External ID can provide secure, seamless sign-in experiences for your consumers and business customers. Explore tenant creation, app registration, flow customization, and account security.