Azure AD SAML setup#
This document provides instructions for configuring Azure AD to send role information to n8n via SAML attributes. This enables automatic role assignment based on Azure AD group membership.
Prerequisites#
You need an Azure AD account with access to Enterprise Applications, and the redirect URL and entity ID from n8n's SAML settings.
Read the Set up SAML guide first.
What n8n requires#
n8n expects a custom SAML attribute to be included in the SAML assertion:
| Attribute Name | Data Type | Purpose |
|---|---|---|
| n8n_instance_role | String | Controls the user's global role in n8n |
Valid values for n8n_instance_role:
| Value | Description |
|---|---|
global:owner |
Full instance owner access |
global:admin |
Administrator access |
global:member |
Regular member access (default if not specified) |
global:chatUser |
Restricted, non-technical role in n8n designed for securely interacting with AI agents via the Chat Hub interface |
Setup#
Step 1: Configure Standard SAML Attributes
- In your Azure AD portal, navigate to your n8n Enterprise Application.
- Go to Single sign-on > Attributes & Claims.
-
Ensure these standard attributes are configured:
Claim Name Source Attribute http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressuser.mail http://schemas.xmlsoap.org/ws/2005/05/identity/claims/firstnameuser.givenname http://schemas.xmlsoap.org/ws/2005/05/identity/claims/lastnameuser.surname http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upnuser.userprincipalname
Step 2: Add the n8n_instance_role Claim
This claim uses conditional logic to emit different role values based on Azure AD group membership.
- In Attributes & Claims, click Add new claim.
- Configure the basic settings:
- Name:
n8n_instance_role - Namespace: leave empty
- Source:
Attribute
- Name:
- Expand Claim conditions and click Add condition.
-
Add conditions for each Azure AD group (in priority order):
User Type Scoped Groups Source Value Members n8n-chatusers Attribute global:chatUserMembers n8n-users Attribute global:memberMembers n8n-admins Attribute global:adminMembers n8n-owners Attribute global:owner
Condition order
Conditions are evaluated in order. Place the most privileged group (owners) at the end.
- Click Save.
Testing the configuration#
- In n8n, go to Settings > SSO.
- Set Role assignment to Instance roles via SSO.
- Set Role mapping method to Map rules on your IdP.
- Click Test settings.
- Verify the SAML response shows the correct
n8n_instance_rolevalue.
Troubleshooting#
Claim not appearing in SAML response
- Verify the user is a member of at least one of the configured groups.
- Check that the groups are assigned to the Enterprise Application.
- Ensure conditions are configured with
Attributeas the source. - Use a browser extension plugin like 'SAML Chrome Panel' to view the application SAML response.
User gets wrong role
- Check condition order (most privileged group should be last).
Assigning multiple project roles using app roles instead of group-based claims#
Using Azure AD group-based claim conditions for assigning multiple project roles to users often results in only the first matching group claim being sent in the SAML assertion. This means users may see access to only one project despite belonging to several groups.
To reliably assign multiple projects with their respective roles, use App Roles defined in the App Registration instead of group-based claims:
- In the App Registration for your n8n SAML app, define App Roles representing each project and permission combination (for example,
<projectId>:<role>). - Save the updated App Manifest.
- In the Enterprise Application, assign users or groups to these App Roles under Users and groups.
- Update the
n8n_projectsSAML claim in Single sign-on > Attributes & Claims to source fromuser.assignedroles. This emits all assigned roles as an array in the SAML response.
This setup ensures n8n receives all project assignments correctly, enabling appropriate access across multiple projects. While defining App Roles adds initial administrative overhead, it simplifies ongoing user-role management and guarantees complete project role sync.
When migrating from group-based claims to App Roles, adjust your role definitions and claims mapping accordingly to prevent incomplete project access.