Microsoft Entra ID SSO is GA in nao Enterprise
nao Enterprise now supports Microsoft Entra ID SSO in general availability, with identity-preserving runtime queries for teams using Azure AD federation.

30 April 2026
By Christophe BlefariTech @ naoMicrosoft Entra ID SSO is now generally available in nao Enterprise.
For companies standardizing access through Azure AD / Microsoft Entra ID, nao can now use your existing identity provider for sign-in and pass the user's identity through to runtime queries where the warehouse supports federation.
This matters for the teams deploying nao beyond the data team. Business users get the familiar "Continue with Microsoft" flow. Admins keep identity in one place. Data teams can keep warehouse access aligned with the person asking the question, not a shared application user.
What ships in GA
The GA release adds:
- Microsoft sign-in for nao Enterprise using your Entra tenant, client ID, and client secret.
- Enterprise license gating so SSO stays part of the Enterprise feature set.
- Identity-preserving query execution for supported database federation flows, starting with Azure Entra ID federation for Redshift.
- MCP support so calls made through the nao MCP can use the same signed-in user's identity when executing SQL.
The setup is intentionally boring: configure AZURE_AD_CLIENT_ID, AZURE_AD_CLIENT_SECRET, and AZURE_AD_TENANT_ID, enable the Enterprise license with the sso feature, and the Microsoft button appears on the login page.
Why this matters
Analytics agents are only useful in production if access control is production-grade too.
A shared service account is easy to wire up, but it weakens the trust model. Once everyone queries through the same identity, it becomes harder to explain who accessed what, harder to map permissions to existing company groups, and harder to satisfy enterprise security reviews.
With Entra ID SSO in nao Enterprise, the flow is closer to how companies already manage access:
- identity lives in Microsoft Entra ID;
- login happens through the company tenant;
- Enterprise features are controlled by the nao license;
- runtime SQL can use the signed-in user's token when the database supports it;
- the same identity path works from the app and from headless surfaces like the nao MCP.
This is a small UI change for users, but a big deployment change for enterprise teams. nao can now fit into Microsoft-centered identity environments without asking admins to create a parallel access model.
Available now
Microsoft Entra ID SSO is available today in nao Enterprise.
If you're self-hosting nao Enterprise, configure the Azure AD environment variables and make sure your license includes the sso feature. If you want identity-preserving runtime queries, configure the database with the Azure Entra ID auth mode supported by your warehouse.
We'll keep expanding the same pattern across more enterprise identity and warehouse federation setups: simple sign-in for users, centralized control for admins, and data access that follows the user's real identity.
If you want to try it out, reach out to claire@getnao.io.
Related articles
product updates
We're launching the first Open Source Analytics Agent Builder
We're open sourcing nao — an analytics agent framework built on context engineering. Here's our vision for what comes after black-box BI.
product updates
Launching the nao MCP
nao now exposes itself as an MCP server. Run governed analytics from Claude, Cursor, Codex, or any MCP-compatible tool.
product updates
Introducing the First Headless Analytics Agent
nao is becoming the first headless analytics agent - your company data brain, everywhere you work. No dashboard needed.

Claire
For nao team