Single sign-on
SSO integration with MFT AFT is a three part process:
- Customer is provided with the information needed to setup the application in their identity provider (IdP).
- Once customer has registered the application/s in the IdP certain parameter are provided to MFT to configure our side of the integration.
- We will schedule a meeting to test your SSO application/s.
For each instance, create an application with your SSO Identity provider (IdP). The information in this email will assist you with creating your SSO application.
There are three steps to this process
- Create your SSO SAML Application within your identity provider (IdP)
- Send us your SSO information once the application is completed so we may update your SSO information in our system
- Meet to test the SSO SAML links
Each Instance will need its own application.
Step 1
The 1st step is setting up your SSO SAML applications. In this step, we provide all of the information you require to successfully create your SAML application with your identity provider (IdP).
- Log into your identity provider (IdP) - Azure AD
- Create a new SAML Application
- Use the information below to complete the application setup:
Service Single Sign On URL and Entity ID
Below is the Service Single Sign On URL and Entity ID you will need for your Prod application:
Prod Instance: https://us.thruinc.com/api/saml/AssertionConsumerService?code=”Customer Code”
Entity ID: ThruUS-”Customer ID”-”Customer Code” for Production
The Service Single Sign On URL provided is specific to the US instance. If your organization uses a different regional MFT instance (such as EU, APAC, or other global locations), you will need to modify the base URL accordingly. For example, an EU instance might use https://eu.thruinc.com/... instead of the US URL.
To obtain the correct Customer Code and Customer ID for your specific instance, you must contact MFT Support. They will provide you with the unique identifiers required to configure your Single Sign On (SSO) settings accurately. Ensure you have these specific details before proceeding with your SSO implementation.
Be sure to select “Use this to be Recipient URL and Destination URL”.
Required Claims
| username | Unique IdP user ID which will be used as username (UserID claim) |
| emailaddress | Users email address |
| givenname | First Name |
| surname | Last Name |
| phone | User’s Phone Number (Optional) |
Most identity providers exhibit similar characteristics. Below is a screenshot of the Azure AD SAML settings used during application creation.

When setting up the Transformation, use your customer code. The screenshot below is for example only.

Use your instance system code for the transformation. The one in the screenshot below is for demonstration only.
This is what the screen should look like after you set up the transformation. This will append your customer code to the username when logging in via SSO.


Step 2
In the 2nd step we need the following information from your identity provider:
- Name - Identity Provider URI
- Single Sign On Service URL
- Certificate in *.Cer file format

Once we receive the required information above, our MFT DevOps Team will update our MFT Servers completing the SSO setup process.
Step 3
MFT Customer Success Team will follow up with you to schedule a meeting. In this meeting, we will test the SSO application links and verify users can authenticate and that new users get created successfully.