diff --git a/docs/kratos/sso-signin/01_overview.mdx b/docs/kratos/sso-signin/01_overview.mdx
new file mode 100644
index 0000000000..adaea6c507
--- /dev/null
+++ b/docs/kratos/sso-signin/01_overview.mdx
@@ -0,0 +1,10 @@
+---
+id: overview
+title: Set up SSO and connect with SAML providers
+sidebar_label: Overview
+---
+
+# Get started with SSO
+
+When using Kratos in a company, it is possible to use it as a SAML Service Provider and connect it to a SAML Identity Provider
+like [ADFS](./10_adfs.mdx) or other [Generic Identity Providers](./05_generic.mdx) IDPs.
diff --git a/docs/kratos/sso-signin/05_generic.mdx b/docs/kratos/sso-signin/05_generic.mdx
new file mode 100644
index 0000000000..7d8c825a1e
--- /dev/null
+++ b/docs/kratos/sso-signin/05_generic.mdx
@@ -0,0 +1,78 @@
+---
+id: generic
+title: Add any SAML SSO provider to your Ory project
+sidebar_label: Generic provider
+toc_max_heading_level: 4
+---
+
+# Generic provider
+
+The "Generic Provider" option allows you to add any SAML provider that doesn't require custom API calls to get the required user
+information. To add a SAML SSO provider, you need these details:
+
+- Service provider metadata
+
+````mdx-code-block
+import Tabs from '@theme/Tabs';
+import TabItem from '@theme/TabItem';
+
+
+
+
+Follow these steps to add a generic provider as a SAML SSO provider to your project using the Ory CLI:
+
+1. Get your provider metadata.
+2. Create a [Jsonnet code snippet](#data-mapping) to map the desired claims to the Ory Identity schema.
+3. Encode the Jsonnet snippet with [Base64](https://www.base64encode.org/) or host it under an URL accessible to The Ory Network.
+4. Download the Ory Identities config from your project and save it to a file:
+
+ ```shell
+ ## List all available projects
+ ory list projects
+
+ ## Get config
+ ory get identity-config {project-id} --format yaml > identity-config.yaml
+ ```
+5. Add the SAML SSO provider configuration to the downloaded config. Add the Jsonnet snippet with mappings as a Base64
+ string or provide an URL to the file.
+
+ ```yaml
+ selfservice:
+ methods:
+ saml:
+ config:
+ providers:
+ - id: generic # This is `` in the Authorization callback URL. DO NOT CHANGE IT ONCE SET!
+ label: generic # Used as a label for the UI login button
+ provider: generic
+ public_cert_path: .... # Replace this with the provider public certificate path
+ private_key_path: .... # Replace this with the provider private key path
+ mapper_url: "base64://{YOUR_BASE64_ENCODED_JSONNET_HERE}"
+
+ idp_information:
+ idp_metadata_url: .... # Replace this with identity provider path URL
+
+ # You must match the values required by Kratos with the name of the attributes sent in the SAML assertion
+ attributes_map:
+ id: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn # ADFS example
+ firstname: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname # ADFS example
+ lastname: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname # ADFS example
+ nickname: default
+ gender: default
+ birthdate: default
+ picture: default
+ email: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress # ADFS example
+ roles: http://schemas.microsoft.com/ws/2008/06/identity/claims/role # ADFS example
+ phone_number: default
+ enabled: true
+ ```
+
+6. Update the Ory Identities configuration using the file you worked with:
+
+ ```shell
+ ory update identity-config {project-id} --file updated_config.yaml
+ ```
+
+
+
+````
diff --git a/docs/kratos/sso-signin/10_adfs.mdx b/docs/kratos/sso-signin/10_adfs.mdx
new file mode 100644
index 0000000000..8ec4b2e7c3
--- /dev/null
+++ b/docs/kratos/sso-signin/10_adfs.mdx
@@ -0,0 +1,126 @@
+---
+id: adfs
+title: Add an ADFS as a SAML SSO provider in Ory
+sidebar_label: ADFS
+toc_max_heading_level: 4
+---
+
+# Active Directory Federation Services
+
+:::note
+
+To add an ADFS as a SAML SSO provider, you need a ADFS installed in a Windows Server.
+
+:::
+
+````mdx-code-block
+import Tabs from '@theme/Tabs';
+import TabItem from '@theme/TabItem';
+
+
+
+
+Follow these steps to add an ADFS as a SAML SSO provider to your project using the Ory CLI:
+
+1. In the top bar of your Windows Server, click on **Tools** → **AD FS Management**.
+2. Click on **Relying Party Trusts**.
+3. Click on **Add Relying Party Trust...***.
+4. Select **Claims aware** then click on **Start**.
+5. Select **Import data about the relying party from a file** and select your Kratos SAML metadata file.
+6. Then click the **Next** button.
+7. Enter a display name for the relying party and click the **Next** button.
+8. Click **Next** in the Access Control window.
+9. Click **Next** again to proceed.
+10. Click the **Close** button in the last window. Your relying party trust is now added to your ADFS.
+11. Create a Jsonnet code snippet to map the desired claims to the Ory Identity schema.
+
+ ```jsonnet
+ local claims = {
+ email_verified: true,
+ } + std.extVar('claims');
+
+ {
+ identity: {
+ traits: {
+ [if 'email' in claims && claims.email_verified then 'email' else null]: claims.email,
+ first_name: claims.given_name,
+ last_name: claims.family_name,
+ [if 'hd' in claims && claims.email_verified then 'hd' else null]: claims.hd,
+ },
+ },
+ }
+ ```
+
+ The sample Jsonnet snippet creates the following mapping:
+
+ | ADFS claim | Ory Identity schema mapping |
+ | :----------- | :-------------------------- |
+ | email | email |
+ | given_name | first_name |
+ | family_name | last_name |
+
+ :::note
+
+ If you want to use this data mapping, you must include the `first_name` and `last_name` fields in your Identity Schema
+
+ :::
+
+3. Encode the Jsonnet snippet with [Base64](https://www.base64encode.org/) or host it under an URL accessible to The Ory Network.
+
+ ```shell
+ cat your-data-mapping.jsonnet | base64
+ ```
+
+4. Download the Ory Identities config from your project and save it to a file:
+
+ ```shell
+ ## List all available projects
+ ory list projects
+
+ ## Get config
+ ory get identity-config {project-id} --format yaml > identity-config.yaml
+ ```
+
+5. Add the SAML SSO provider configuration to the downloaded config. Add the Jsonnet snippet with mappings as a Base64
+ string or provide an URL to the file.
+
+ ```yaml
+ selfservice:
+ methods:
+ saml:
+ config:
+ providers:
+ - id: generic # This is `` in the Authorization callback URL. DO NOT CHANGE IT ONCE SET!
+ label: generic # Used as a label for the UI login button
+ provider: generic
+ public_cert_path: .... # Replace this with the provider public certificate path
+ private_key_path: .... # Replace this with the provider private key path
+ mapper_url: "base64://{YOUR_BASE64_ENCODED_JSONNET_HERE}"
+
+ idp_information:
+ idp_metadata_url: .... # Replace this with identity provider path URL
+
+ # You must match the values required by Kratos with the name of the attributes sent in the SAML assertion
+ attributes_map:
+ id: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn # ADFS example
+ firstname: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname # ADFS example
+ lastname: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname # ADFS example
+ nickname: default
+ gender: default
+ birthdate: default
+ picture: default
+ email: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress # ADFS example
+ roles: http://schemas.microsoft.com/ws/2008/06/identity/claims/role # ADFS example
+ phone_number: default
+ enabled: true
+ ```
+
+6. Update the Ory Identities configuration using the file you worked with:
+
+ ```shell
+ ory update identity-config {project-id} --file updated_config.yaml
+ ```
+
+
+
+````