Requirements:
On the off chance that you are utilizing a Salesforce.com trial account, then you will be not able design computerized client provisioning. Trial accounts don't have the essential API access empowered until they are obtained.
Step 1:
Add Salesforce to your catalog






Step 2:
Open another tab in your program and sign into your Salesforce head account.
Under the Administrator route sheet, click Security Controls to extend the related area. At that point click on Single Sign-On Settings.
- To get to Azure Active Directory through the Azure great entrance, you should first have a legitimate Azure membership.
- You should have a legitimate occupant in Salesforce.com.
On the off chance that you are utilizing a Salesforce.com trial account, then you will be not able design computerized client provisioning. Trial accounts don't have the essential API access empowered until they are obtained.
Step 1:
Add Salesforce to your catalog
- In the Azure exemplary entrance, on the left route sheet, click Active Directory.

- From the Directory list, select the catalog that you might want to add Salesforce to.
- Click on Applications in the top menu.

- Click Add at the base of the page.

- On the What would you like to do exchange, click Add an application from the display.

- In the hunt box, sort Salesforce. At that point select Salesforce from the outcomes, and snap Complete to include the application.

- You ought to now see the Quick Start page for Salesforce:

Step 2:
- Enable single sign-on
- Before you can design single sign-on, you should set up and convey a custom area for your Salesforce surroundings. For directions on the most proficient method to do that, see Set Up a Domain Name.
- On Salesforce's Quick Start page in Azure AD, tap the Configure single sign-on catch.
- A discourse will open and you'll see a screen that asks "How might you like clients to sign on to Salesforce?" Select Azure AD Single Sign-On, and afterward click Next.
- Venture account: https://<domain>.my.salesforce.com\
- Designer account: https://<domain>-dev-ed.my.salesforce.com
Open another tab in your program and sign into your Salesforce head account.
Under the Administrator route sheet, click Security Controls to extend the related area. At that point click on Single Sign-On Settings.
- On the Single Sign-On Settings page, tap the Edit catch.
- Select SAML Enabled, and after that snap Save.
- To design your SAML single sign-on settings, click New.
- On the SAML Single Sign-On Setting Edit page, make the accompanying setups:
- In Azure AD, duplicate the Issuer URL quality, and after that glue it into the Issuer field in Salesforce.
- In the Entity Id textbox, sort your Salesforce space name utilizing the accompanying example:
- Undertaking account: https://<domain>.my.salesforce.com
- Engineer account: https://<domain>-dev-ed.my.salesforce